MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 97b8275d582b042ef248a2983905bb23280d609ba51393b7abd58fb7d94e9fd0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
SnakeKeylogger
Vendor detections: 14
| SHA256 hash: | 97b8275d582b042ef248a2983905bb23280d609ba51393b7abd58fb7d94e9fd0 |
|---|---|
| SHA3-384 hash: | fedf74f824751473d1da507e1b0dd2f0c035222e9d01612a74b37fae0b9f416a0b8d8483fd9a782a91a40ce12bda6c62 |
| SHA1 hash: | ad89392d4d6978bdcc006619848e6e66af945326 |
| MD5 hash: | 88398f906322ec15187390184b930a71 |
| humanhash: | aspen-ceiling-four-north |
| File name: | dekont garanti bbva_Başka Bankaya Transfer 01112 img .exe |
| Download: | download sample |
| Signature | SnakeKeylogger |
| File size: | 740'352 bytes |
| First seen: | 2025-01-09 18:09:45 UTC |
| Last seen: | 2025-01-09 18:11:04 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'648 x AgentTesla, 19'452 x Formbook, 12'201 x SnakeKeylogger) |
| ssdeep | 12288:5c55OHTDPdDzp5Itu0m/ABN+ckfOV7hE1S6wD+vxhnhXdymEFWngluiRHr6QSXOP:5cXOPtzp54C/ABQTfINZcLXdNEFjNrLX |
| Threatray | 765 similar samples on MalwareBazaar |
| TLSH | T19EF402A45529DF07D416A7B00A31F2B427B92EDEAC02E31A9FDA7DEFB565F111C00683 |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10522/11/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4504/4/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| Magika | pebin |
| Reporter | |
| Tags: | exe SnakeKeylogger |
Intelligence
File Origin
DEVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | AgentTesla_DIFF_Common_Strings_01 |
|---|---|
| Author: | schmidtsz |
| Description: | Identify partial Agent Tesla strings |
| Rule name: | golang_david_CSC846 |
|---|---|
| Author: | David |
| Description: | CSC-846 Golang |
| Rule name: | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_DotNetProcHook |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables with potential process hoocking |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_TelegramChatBot |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables using Telegram Chat Bot |
| Rule name: | MAL_Envrial_Jan18_1 |
|---|---|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects Encrial credential stealer malware |
| Reference: | https://twitter.com/malwrhunterteam/status/953313514629853184 |
| Rule name: | MAL_Envrial_Jan18_1_RID2D8C |
|---|---|
| Author: | Florian Roth |
| Description: | Detects Encrial credential stealer malware |
| Reference: | https://twitter.com/malwrhunterteam/status/953313514629853184 |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | RansomPyShield_Antiransomware |
|---|---|
| Author: | XiAnzheng |
| Description: | Check for Suspicious String and Import combination that Ransomware mostly abuse(can create FP) |
| Rule name: | RANSOMWARE |
|---|---|
| Author: | ToroGuitar |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | Sus_Obf_Enc_Spoof_Hide_PE |
|---|---|
| Author: | XiAnzheng |
| Description: | Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP) |
| Rule name: | telegram_bot_api |
|---|---|
| Author: | rectifyq |
| Description: | Detects file containing Telegram Bot API |
| Rule name: | Windows_Trojan_SnakeKeylogger_af3faa65 |
|---|---|
| Author: | Elastic Security |
| Rule name: | XWorm_3_0_3_1_Detection |
|---|---|
| Author: | Archevod |
| Description: | Detects XWorm versions 3.0 and 3.1 |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.