MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 831e8ce3737eb50cf77ef5d14a4af9370cd3fa6c4a6db7c0566ddea968e9a2a9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
SnakeKeylogger
Vendor detections: 16
| SHA256 hash: | 831e8ce3737eb50cf77ef5d14a4af9370cd3fa6c4a6db7c0566ddea968e9a2a9 |
|---|---|
| SHA3-384 hash: | aa291bba613aef219a272ce3b7ff935b1d096dfcacc64b2f9fc37616959c09429a4455217912b90a74dcaad9e183927d |
| SHA1 hash: | ccca7df544d234130b35c5477cbddc5d5decb619 |
| MD5 hash: | 25d12df40b5528fd8eb4385e5ddcf60d |
| humanhash: | fish-india-bluebird-single |
| File name: | DHL AWB DOCUMENTS.exe |
| Download: | download sample |
| Signature | SnakeKeylogger |
| File size: | 256'884 bytes |
| First seen: | 2023-01-27 14:00:53 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 61259b55b8912888e90f516ca08dc514 (1'059 x Formbook, 741 x AgentTesla, 427 x GuLoader) |
| ssdeep | 6144:/Ya6i74akTBwn7tB+9eQeQRQlvNiLZZL0bd1ycHoqIL:/YEkakTenvaL4NiUd1yf |
| TLSH | T167441261B6F0D46BFC2047742F39D90376ABA21618BCAF1B7B405E1DBD22484E46E367 |
| TrID | 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 15.9% (.EXE) Win64 Executable (generic) (10523/12/4) 9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 7.6% (.EXE) Win16 NE executable (generic) (5038/12/1) 6.8% (.EXE) Win32 Executable (generic) (4505/5/1) |
| File icon (PE): | |
| dhash icon | b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla) |
| Reporter | |
| Tags: | DHL exe SnakeKeylogger |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Unpacked files
b3d857405bc06ef7e5822e4d12f5d7128bf50ba6068553ea90db865b35a19a88
49c9ed92eee655ab544f204f3acbf53eb9f9074434130d2d55f07c89d2791945
a2e80fe784075653b12fd04576bd2927f9c55c22cea194b8263605daa3e7b120
c0e8dcf4096de51fec0709a1e6778923be7f5320389e38cf6b93965ef4daa904
e4393bcc825e851c046d310dd10515895ea041b4f94109108b35fc56a0dc51a4
831e8ce3737eb50cf77ef5d14a4af9370cd3fa6c4a6db7c0566ddea968e9a2a9
1da8a820643459015205f97eb9b7abcdb173ce87bbdb74da0b79e970bbc32fc6
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | cobalt_strike_tmp01925d3f |
|---|---|
| Author: | The DFIR Report |
| Description: | files - file ~tmp01925d3f.exe |
| Reference: | https://thedfirreport.com |
| Rule name: | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_DotNetProcHook |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables with potential process hoocking |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many email and collaboration clients. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_TelegramChatBot |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables using Telegram Chat Bot |
| Rule name: | MALWARE_Win_SnakeKeylogger |
|---|---|
| Author: | ditekSHen |
| Description: | Detects Snake Keylogger |
| Rule name: | MAL_Envrial_Jan18_1 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects Encrial credential stealer malware |
| Reference: | https://twitter.com/malwrhunterteam/status/953313514629853184 |
| Rule name: | MAL_Envrial_Jan18_1_RID2D8C |
|---|---|
| Author: | Florian Roth |
| Description: | Detects Encrial credential stealer malware |
| Reference: | https://twitter.com/malwrhunterteam/status/953313514629853184 |
| Rule name: | pe_imphash |
|---|
| Rule name: | shellcode |
|---|---|
| Author: | nex |
| Description: | Matched shellcode byte patterns |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | Windows_Trojan_SnakeKeylogger_af3faa65 |
|---|---|
| Author: | Elastic Security |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.