MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 762fb1683020a79af732503a2a75eeaa1c4c3f844472f50e5b955a71297f2565. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



SnakeKeylogger


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 762fb1683020a79af732503a2a75eeaa1c4c3f844472f50e5b955a71297f2565
SHA3-384 hash: 890283f425c5c93e53a57a4c9be9786845914591f85eda3a57ddf573d84fd1952c87e3a207137451277fa6f954947549
SHA1 hash: f04a3bb81527033c6891daf1063eae822e8fd5c4
MD5 hash: 055d8df9f7096092a779c271a48feb74
humanhash: pasta-purple-chicken-whiskey
File name:received PO Ref-28414779.lzh
Download: download sample
Signature SnakeKeylogger
File size:620'706 bytes
First seen:2021-08-17 10:44:05 UTC
Last seen:Never
File type: rar
MIME type:application/x-rar
ssdeep 12288:8nH920T1i8LPhnIBhXWHBd2+i5OBvi4MNa5cG65ZSyEPv3yADMecOOJHy:AL1i8LPhnyXWhd2+i5OBvTcG65ZSnHfP
TLSH T142D42360168CC25AD5BDAF9E1055E06B023C5D12BB72BF04F701D4889D5B1BF87A879F
Reporter cocaman
Tags:lzh rar SnakeKeylogger


Avatar
cocaman
Malicious email (T1566.001)
From: "PIP KARWA <pipduqm@gmail.com>" (likely spoofed)
Received: "from gmail.com (unknown [185.222.58.146]) "
Date: "17 Aug 2021 12:42:22 +0200"
Subject: "RE: Confirm received PO "
Attachment: "received PO Ref-28414779.lzh"

Intelligence


File Origin
# of uploads :
1
# of downloads :
140
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-08-17 10:45:08 UTC
File Type:
Binary (Archive)
Extracted files:
12
AV detection:
11 of 28 (39.29%)
Threat level:
  5/5
Result
Malware family:
snakekeylogger
Score:
  10/10
Tags:
family:snakekeylogger keylogger spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of SetThreadContext
Looks up external IP address via web service
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Snake Keylogger
Snake Keylogger Payload
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

SnakeKeylogger

rar 762fb1683020a79af732503a2a75eeaa1c4c3f844472f50e5b955a71297f2565

(this sample)

  
Delivery method
Distributed via e-mail attachment
  
Dropping
SnakeKeylogger

Comments