MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 750c597899063c79f01f196299eac7768daad827e0164f30c904000629474226. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
SnakeKeylogger
Vendor detections: 15
| SHA256 hash: | 750c597899063c79f01f196299eac7768daad827e0164f30c904000629474226 |
|---|---|
| SHA3-384 hash: | beb89cd2035e988999d3c467bc6a5d908f902f977a5986843430f91216246d7d43b806f1459435772ec62392806bb819 |
| SHA1 hash: | f61c84ae72b2c11fb845f104f79261c833aa5a73 |
| MD5 hash: | 7e6398a6a7a38bf23efc22f9b18a420e |
| humanhash: | mango-green-fruit-september |
| File name: | hesaphareketi-01.pdf.exe |
| Download: | download sample |
| Signature | SnakeKeylogger |
| File size: | 573'440 bytes |
| First seen: | 2023-12-14 07:23:20 UTC |
| Last seen: | 2023-12-14 09:23:17 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'462 x Formbook, 12'204 x SnakeKeylogger) |
| ssdeep | 12288:HVj3hLQvfdxOo7gpXtreF725DJXnyEmrzZt3TAZtmgm1+Y4nRkkb8DBMiG3fwC:2MLXyDz8fQ+XqhBMbr |
| TLSH | T1BAC4E04526684FA6D43B6FFA171F2DC0C772AB665321E6549CD320DB1A61B0C0E3EB63 |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10523/12/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4505/5/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| File icon (PE): | |
| dhash icon | 644c088c0448484c (3 x SnakeKeylogger, 2 x Formbook, 2 x AgentTesla) |
| Reporter | |
| Tags: | exe geo SnakeKeylogger TUR |
Intelligence
File Origin
# of uploads :
2
# of downloads :
315
Origin country :
NLVendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
hesaphareketi-01.pdf.exe
Verdict:
Malicious activity
Analysis date:
2023-12-14 07:31:37 UTC
Tags:
evasion snake keylogger
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Detection(s):
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a window
Creating a process with a hidden window
Launching a process
Restart of the analyzed sample
Adding an exclusion to Microsoft Defender
Verdict:
Likely Malicious
Threat level:
7.5/10
Confidence:
100%
Tags:
masquerade packed
Verdict:
Malicious
Labled as:
Win/malicious_confidence_90%
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Malicious
Result
Threat name:
Snake Keylogger
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses an obfuscated file name to hide its real file extension (double extension)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected AntiVM3
Yara detected Generic Downloader
Yara detected Snake Keylogger
Yara detected Telegram RAT
Behaviour
Behavior Graph:
Score:
100%
Verdict:
Malware
File Type:
PE
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2023-09-26 13:07:43 UTC
File Type:
PE (.Net Exe)
Extracted files:
23
AV detection:
24 of 37 (64.86%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Result
Malware family:
snakekeylogger
Score:
10/10
Tags:
family:snakekeylogger collection keylogger spyware stealer
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Looks up external IP address via web service
Checks computer location settings
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Snake Keylogger
Snake Keylogger payload
Unpacked files
SH256 hash:
63a066b17e0007822c1efad15d4f9198ed6e6b294a30089079b96a1a5c73f0f0
MD5 hash:
efda767ac8f9fb634ff8886162580d19
SHA1 hash:
e37b6fee413bef4b1756f23543190cd31cdf47e2
SH256 hash:
06ecf916b6e3d161ee0614ac558477f56b8f9212fc41bf00234ff62b15b86027
MD5 hash:
cb1d86841c8f922f3a4106b0dba1b144
SHA1 hash:
8eacdefdb557684ca8e9204621e7459d339d8f28
Detections:
snake_keylogger
win_404keylogger_g1
INDICATOR_SUSPICIOUS_EXE_TelegramChatBot
MAL_Envrial_Jan18_1
MALWARE_Win_SnakeKeylogger
INDICATOR_SUSPICIOUS_Binary_References_Browsers
INDICATOR_SUSPICIOUS_EXE_DotNetProcHook
INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients
Parent samples :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 hash:
abed99881ce1e05907653d1697ae232575d0cf067fd5cc646e2e5ee9f7337c82
MD5 hash:
491a7170bd8a7ed81d03a64ff2598bdf
SHA1 hash:
8325a5bccba80878a14032c06b78b34db808b910
SH256 hash:
7ec118e70613ce2d9aee29cda2918ca710dde346c68d4da75c2ea0402e6d4391
MD5 hash:
1622a62bf6805b2dca82a8632eceac71
SHA1 hash:
071b72a5a1231149dfe4b9fcfa3a6ee49265ab7c
SH256 hash:
750c597899063c79f01f196299eac7768daad827e0164f30c904000629474226
MD5 hash:
7e6398a6a7a38bf23efc22f9b18a420e
SHA1 hash:
f61c84ae72b2c11fb845f104f79261c833aa5a73
Malware family:
SnakeKeylogger
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.