MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 8d9b57880d80469bc0ac02534a625ed12dc958d64deda179ccd5715336622ddb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
SnakeKeylogger
Vendor detections: 17
| SHA256 hash: | 8d9b57880d80469bc0ac02534a625ed12dc958d64deda179ccd5715336622ddb |
|---|---|
| SHA3-384 hash: | 4b6d4d1a758086a0cc4aa7a671add55cc03d9ec6ebae8e7654b12907c4c3c219576f228f4e6d9b6bbbf4e883921d9b67 |
| SHA1 hash: | 2411eaf6fc1c1d5355fbd5d2af95f4661d1fda3f |
| MD5 hash: | df769518756ed282f9af13acf08d5154 |
| humanhash: | network-nevada-batman-network |
| File name: | Office Suppliers Order.exe |
| Download: | download sample |
| Signature | SnakeKeylogger |
| File size: | 377'344 bytes |
| First seen: | 2024-06-13 13:00:25 UTC |
| Last seen: | 2024-06-13 13:25:43 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger) |
| ssdeep | 6144:n97WboCKnLrtLMY+/KK49Jqaq0NiKF5VEEOuNLBRVMygLc95Bxj4v1avgFjuM:FWboCKLBYiK4GaqcrGEOuN2rUBxy+gE |
| Threatray | 5'991 similar samples on MalwareBazaar |
| TLSH | T1DC84E159578C2E61D0D78EBA22F384491532F8731D91E3CA18C5CA8E7B36BCD098F796 |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10523/12/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4504/4/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| Reporter | |
| Tags: | exe SnakeKeylogger |
Intelligence
File Origin
CHVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_DotNetProcHook |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables with potential process hoocking |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many email and collaboration clients. Observed in information stealers |
| Rule name: | MALWARE_Win_SnakeKeylogger |
|---|---|
| Author: | ditekSHen |
| Description: | Detects Snake Keylogger |
| Rule name: | MAL_Envrial_Jan18_1 |
|---|---|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects Encrial credential stealer malware |
| Reference: | https://twitter.com/malwrhunterteam/status/953313514629853184 |
| Rule name: | MAL_Envrial_Jan18_1_RID2D8C |
|---|---|
| Author: | Florian Roth |
| Description: | Detects Encrial credential stealer malware |
| Reference: | https://twitter.com/malwrhunterteam/status/953313514629853184 |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | Windows_Trojan_SnakeKeylogger_af3faa65 |
|---|---|
| Author: | Elastic Security |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (GUARD_CF) | high |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.