MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 70d3e45f0a41222ee06aa33124206699e822e01114b968b80d1419013fd9a623. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
SnakeKeylogger
Vendor detections: 16
| SHA256 hash: | 70d3e45f0a41222ee06aa33124206699e822e01114b968b80d1419013fd9a623 |
|---|---|
| SHA3-384 hash: | b41829db1d07d888b4956e9573392531f7e55c3629e5c071ccc0551ac842451f7fc27a6944cf5c1cc31d85782fcf8323 |
| SHA1 hash: | 9191e400e45937465d729a6988bbf1b88447270c |
| MD5 hash: | 70df3bd12e57b52e292bc2aebd8b976e |
| humanhash: | hotel-twenty-fish-illinois |
| File name: | MT103 PAYMENT CONFIRMATION_xls.exe |
| Download: | download sample |
| Signature | SnakeKeylogger |
| File size: | 3'198'976 bytes |
| First seen: | 2023-02-10 12:03:05 UTC |
| Last seen: | 2023-02-10 13:32:12 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'649 x AgentTesla, 19'452 x Formbook, 12'202 x SnakeKeylogger) |
| ssdeep | 24576:qIjHwzHmpcSJTQpoL5cxytNt8j+giC66Wa+tI6Wa+tkiZupoSXz:DwzyjLKxytNt8j+giMjajwc |
| TLSH | T15BE5A630AEE9EC79F077AF7599E4F1D9996FBA522B02950F104432460973B40EDC1E3A |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10523/12/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4505/5/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| File icon (PE): | |
| dhash icon | b0454a4c4c428010 (5 x AveMariaRAT, 2 x SnakeKeylogger, 2 x AgentTesla) |
| Reporter | |
| Tags: | exe SnakeKeylogger |
Intelligence
File Origin
DEVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_DotNetProcHook |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables with potential process hoocking |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many email and collaboration clients. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_TelegramChatBot |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables using Telegram Chat Bot |
| Rule name: | MALWARE_Win_SnakeKeylogger |
|---|---|
| Author: | ditekSHen |
| Description: | Detects Snake Keylogger |
| Rule name: | MAL_Envrial_Jan18_1 |
|---|---|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects Encrial credential stealer malware |
| Reference: | https://twitter.com/malwrhunterteam/status/953313514629853184 |
| Rule name: | MAL_Envrial_Jan18_1_RID2D8C |
|---|---|
| Author: | Florian Roth |
| Description: | Detects Encrial credential stealer malware |
| Reference: | https://twitter.com/malwrhunterteam/status/953313514629853184 |
| Rule name: | pdb_YARAify |
|---|---|
| Author: | @wowabiy314 |
| Description: | PDB |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | Windows_Trojan_SnakeKeylogger_af3faa65 |
|---|---|
| Author: | Elastic Security |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.