MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 85913be7b7f0f7de4a9e3e28f16a32fc61c676d958c35296f07f8f63c20d4824. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
SnakeKeylogger
Vendor detections: 16
| SHA256 hash: | 85913be7b7f0f7de4a9e3e28f16a32fc61c676d958c35296f07f8f63c20d4824 |
|---|---|
| SHA3-384 hash: | a69d9fc3457070a3dd5612caec7ce9126c9679e762e5c287f8348084178cfd9589eb6c5c39b8d4d317b195bcffce56bf |
| SHA1 hash: | 6fc44aaaf076b1d21d39b32437f848bbf4fe61ab |
| MD5 hash: | 3eed726a7e4ec5b0cda4070734101244 |
| humanhash: | oranges-nebraska-grey-saturn |
| File name: | yzy3GN7FPnFiSeC.exe |
| Download: | download sample |
| Signature | SnakeKeylogger |
| File size: | 590'848 bytes |
| First seen: | 2023-05-11 18:30:11 UTC |
| Last seen: | 2023-05-14 18:43:51 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'744 x AgentTesla, 19'610 x Formbook, 12'242 x SnakeKeylogger) |
| ssdeep | 12288:fqUWjmKRbQlvUziVNRfFIUV8vn8Gg3YvZYrXKssUARSWc:3+mKXzipd1vGg3YvZTsw |
| Threatray | 1'088 similar samples on MalwareBazaar |
| TLSH | T11DC4CF84923BFFE1DA6517F0211434424B3DA11A75F8E0BC6D5B78C9C89AB158FD8BA3 |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10523/12/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4505/5/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| File icon (PE): | |
| dhash icon | b1b1b17964989c06 (31 x SnakeKeylogger, 4 x AgentTesla, 3 x XWorm) |
| Reporter | |
| Tags: | exe SnakeKeylogger |
Intelligence
File Origin
# of uploads :
3
# of downloads :
250
Origin country :
NLVendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
yzy3GN7FPnFiSeC.exe
Verdict:
Malicious activity
Analysis date:
2023-05-11 18:30:50 UTC
Tags:
snake keylogger trojan evasion
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
Snake
Detection(s):
Result
Verdict:
Malware
Maliciousness:
Behaviour
Searching for the window
Creating a window
Launching a process
Creating a process with a hidden window
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Tags:
barys comodo lokibot packed
Verdict:
Malicious
Labled as:
Strictor.Generic
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Snake Keylogger
Verdict:
Malicious
Result
Threat name:
Snake Keylogger
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Generic Downloader
Yara detected Snake Keylogger
Yara detected Telegram RAT
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Strictor
Status:
Malicious
First seen:
2023-05-11 08:58:00 UTC
AV detection:
11 of 37 (29.73%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Similar samples:
+ 1'078 additional samples on MalwareBazaar
Result
Malware family:
snakekeylogger
Score:
10/10
Tags:
family:snakekeylogger collection keylogger spyware stealer
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Looks up external IP address via web service
Checks computer location settings
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Snake Keylogger
Snake Keylogger payload
Malware Config
C2 Extraction:
https://api.telegram.org/bot5412042498:AAH4OVSAlB-9yvO0MxObTPVF8mPej6Ln4M4/sendMessage?chat_id=5573520537
Unpacked files
SH256 hash:
7d315560fe6dd2b7ca6214d539a540938cb148969628ede47f9348f882033a4b
MD5 hash:
9ee7ebc404ce9aa851693ac5302fc0e9
SHA1 hash:
feed60fd6a8ad99b0d41d5e9be3541b0f67af93d
SH256 hash:
7335f70a056d18401ee83c1e4ab0d87a953c8a24205d4f35b203bf9b0ab53fc7
MD5 hash:
23a255ef9cfc6690da2b014120a69396
SHA1 hash:
d719b87fe4a2449c10a26105e94d05463bc5fa86
Detections:
snake_keylogger
Parent samples :
c867fd488ab6ce0432121c22a8135548149fdec7ac7034c5e9ad6a78f4d08c5d
11c40e089217d16a0e9011687cf21883e5039ea51c1f32f529d55190e81214bf
85913be7b7f0f7de4a9e3e28f16a32fc61c676d958c35296f07f8f63c20d4824
398c5e8474d46a3c0855c3ccaaa0dedaf04e5250aa39c7bf778e8d6dd90100c8
6606e8e5dbcaf4e3c38620c97849f456c0bac6999a075575d7f24ed742c4ebef
bb8e3470cf05d4aa4e74551b11a39436681db63206d7c1bee0ddb4bdfe99dec7
83e4ebc8630c82ede3203b44241bed059dc17c1dbf29c37cebaa401be387a9a3
3f636bdccb31f00e931d76d42bad757c5d8f1ec7973c81f054bf2a1baf7d37a2
64ff25d9b3c43b39f74083320d5bd73c1e4ec4ba7712c66491594557d02ae287
11c40e089217d16a0e9011687cf21883e5039ea51c1f32f529d55190e81214bf
85913be7b7f0f7de4a9e3e28f16a32fc61c676d958c35296f07f8f63c20d4824
398c5e8474d46a3c0855c3ccaaa0dedaf04e5250aa39c7bf778e8d6dd90100c8
6606e8e5dbcaf4e3c38620c97849f456c0bac6999a075575d7f24ed742c4ebef
bb8e3470cf05d4aa4e74551b11a39436681db63206d7c1bee0ddb4bdfe99dec7
83e4ebc8630c82ede3203b44241bed059dc17c1dbf29c37cebaa401be387a9a3
3f636bdccb31f00e931d76d42bad757c5d8f1ec7973c81f054bf2a1baf7d37a2
64ff25d9b3c43b39f74083320d5bd73c1e4ec4ba7712c66491594557d02ae287
SH256 hash:
c72ca892abebd8794a9544913d071c3c91356f5075509717727e180e87cb98ba
MD5 hash:
25383385b11436b817ed4dc0419f4e24
SHA1 hash:
9441f35f45a30503ebb2c717209f29341b5b48b6
SH256 hash:
fc0dd176ee55542dd3f43b9c8726a4602f4c9de087a45baa9309ef6e0a348d48
MD5 hash:
2dca7c1a63404ffe15a8e24bcc7fb755
SHA1 hash:
7d0c9a6b3ecd2811e26ed04c120a7b9582ee1503
SH256 hash:
6312c157caa627fb782f419dc870e805d18bdaf2d305a0267881e9818453e801
MD5 hash:
14afd225ffb05643999ce842f017d6b6
SHA1 hash:
7869fa3a516596ce6e0f99c2f594ad50991c78ae
SH256 hash:
85913be7b7f0f7de4a9e3e28f16a32fc61c676d958c35296f07f8f63c20d4824
MD5 hash:
3eed726a7e4ec5b0cda4070734101244
SHA1 hash:
6fc44aaaf076b1d21d39b32437f848bbf4fe61ab
Malware family:
SnakeKeylogger
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Password Stealer
Score:
0.90
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.