MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 916813387ba52a892f9a9f10f3d709745bedf80adacd9e2c42869a1131535612. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



SnakeKeylogger


Vendor detections: 13


Intelligence 13 IOCs YARA 2 File information Comments

SHA256 hash: 916813387ba52a892f9a9f10f3d709745bedf80adacd9e2c42869a1131535612
SHA3-384 hash: 02d818af143ee67b8f72b9ef118603e6f30b2e50f5b1bacc485fd21d633460889755c932bcdb16ea60b46bff2d07aa23
SHA1 hash: 94dad9c18b4098abecd0ef367d68e393dc5e9173
MD5 hash: fa023b2ab25eb6370a8776c8a94de7a7
humanhash: pip-india-triple-jersey
File name:Confirmación de recibo de transferencia.exe
Download: download sample
Signature SnakeKeylogger
File size:655'360 bytes
First seen:2023-04-25 15:30:03 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'650 x AgentTesla, 19'462 x Formbook, 12'203 x SnakeKeylogger)
ssdeep 12288:4xm+vY07/NBDiJpbY2Mo7YENsaMrtZForsk1lDuZGZ2SSGS:Ym0/NBWprM6zNi/yrV15uv3
Threatray 4'943 similar samples on MalwareBazaar
TLSH T197D4593C28BD223BC179D6B98FD5D827F454C96F3121AE25A4D78B624746E2235C323E
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Reporter abuse_ch
Tags:exe SnakeKeylogger

Intelligence


File Origin
# of uploads :
1
# of downloads :
258
Origin country :
NL NL
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a custom TCP request
Creating a process from a recently created file
Creating a file
Сreating synchronization primitives
DNS request
Sending an HTTP GET request
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Forced shutdown of a browser
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
formbook packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Snake Keylogger, StormKitty
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Found malware configuration
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Yara detected Generic Downloader
Yara detected Snake Keylogger
Yara detected StormKitty Stealer
Yara detected Telegram RAT
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2023-04-25 15:31:07 UTC
File Type:
PE (.Net Exe)
Extracted files:
5
AV detection:
16 of 24 (66.67%)
Threat level:
  5/5
Result
Malware family:
stormkitty
Score:
  10/10
Tags:
family:snakekeylogger family:stormkitty collection keylogger spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Looks up external IP address via web service
Reads user/profile data of web browsers
Snake Keylogger
Snake Keylogger payload
StormKitty
StormKitty payload
Unpacked files
SH256 hash:
21f0154b51a09767f94922b81f5fcd15cf4a6390ab7314e40d0e17b2dcdfe6ba
MD5 hash:
c926563698de3a89ad20474c85122f73
SHA1 hash:
ed1a3b2527ace111e6f39880c7ee3965f301330d
SH256 hash:
2281a219b76f9683732d7cb4291c81a2d0cb9042d2363e555ecf06763b3e4bf6
MD5 hash:
6d28f6c307e7056f548d8100219f34ba
SHA1 hash:
e672a1a2a38d57e912ea31566b87121e40fb74b3
SH256 hash:
0e407c73031f15f12e078c92f7a872c2f3c980ca5f2029a26b65f609abe8ec88
MD5 hash:
21f56f5c74691405212ec41a32c65631
SHA1 hash:
bb40bf5685c37240fd003acd8cf9265279177427
SH256 hash:
c4051e19c7fff236d9c13318dfac4f14903215c718e4c1d9effb29fc55711dab
MD5 hash:
6189513c1107890aab83430828cfb48f
SHA1 hash:
91d2745c245e54a01fc81935f10446defef28ac4
SH256 hash:
916813387ba52a892f9a9f10f3d709745bedf80adacd9e2c42869a1131535612
MD5 hash:
fa023b2ab25eb6370a8776c8a94de7a7
SHA1 hash:
94dad9c18b4098abecd0ef367d68e393dc5e9173
Malware family:
SnakeKeylogger
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

SnakeKeylogger

Executable exe 916813387ba52a892f9a9f10f3d709745bedf80adacd9e2c42869a1131535612

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments