MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 80c99fdb06e5324132ca5341b60c2e459418b0d51293a151d97fc6d00690202f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
SnakeKeylogger
Vendor detections: 17
| SHA256 hash: | 80c99fdb06e5324132ca5341b60c2e459418b0d51293a151d97fc6d00690202f |
|---|---|
| SHA3-384 hash: | 1bde5317e48b819546b577764edbf26d7e979c967433b7341842a09a5fa9a9bdfab41aaafea88c635ff50394c6fa8dc9 |
| SHA1 hash: | cd00fb926eae7a66fe4aefa8bce05733b42ed297 |
| MD5 hash: | ff6edd796624d57583a48b5342ef17ea |
| humanhash: | nitrogen-eight-neptune-cold |
| File name: | Quotation Form.exe |
| Download: | download sample |
| Signature | SnakeKeylogger |
| File size: | 631'296 bytes |
| First seen: | 2025-03-31 09:44:50 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger) |
| ssdeep | 12288:jvtJlZJzB7dA0Akcwtvt/Q02EvFh6BxfMnq7U6mXcgIbnIjAw4qQ3VjMosg:btrhVhcxfRUBXIQAwvMVjHs |
| Threatray | 1'301 similar samples on MalwareBazaar |
| TLSH | T1B0D4D054B256DF0BC93A4BF81672E1B917BD2EEEB411E3099DD96DEB7562F010C00A83 |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10522/11/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4504/4/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| Magika | pebin |
| Reporter | |
| Tags: | exe SnakeKeylogger |
Intelligence
File Origin
CHVendor Threat Intelligence
Result
Behaviour
Result
Signature
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | AgentTesla_DIFF_Common_Strings_01 |
|---|---|
| Author: | schmidtsz |
| Description: | Identify partial Agent Tesla strings |
| Rule name: | crime_snake_keylogger |
|---|---|
| Author: | Rony (r0ny_123) |
| Description: | Detects Snake keylogger payload |
| Rule name: | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_DotNetProcHook |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables with potential process hoocking |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many email and collaboration clients. Observed in information stealers |
| Rule name: | MALWARE_Win_SnakeKeylogger |
|---|---|
| Author: | ditekSHen |
| Description: | Detects Snake Keylogger |
| Rule name: | MAL_Envrial_Jan18_1 |
|---|---|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects Encrial credential stealer malware |
| Reference: | https://twitter.com/malwrhunterteam/status/953313514629853184 |
| Rule name: | MAL_Envrial_Jan18_1_RID2D8C |
|---|---|
| Author: | Florian Roth |
| Description: | Detects Encrial credential stealer malware |
| Reference: | https://twitter.com/malwrhunterteam/status/953313514629853184 |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | RANSOMWARE |
|---|---|
| Author: | ToroGuitar |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | Sus_Obf_Enc_Spoof_Hide_PE |
|---|---|
| Author: | XiAnzheng |
| Description: | Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP) |
| Rule name: | Windows_Trojan_SnakeKeylogger_af3faa65 |
|---|---|
| Author: | Elastic Security |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.