MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 995d7782b47ae9d044a0a1edf76a011241ab941c09af6e8a90eeab23f82225e2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



SnakeKeylogger


Vendor detections: 13


Intelligence 13 IOCs YARA 3 File information Comments

SHA256 hash: 995d7782b47ae9d044a0a1edf76a011241ab941c09af6e8a90eeab23f82225e2
SHA3-384 hash: d686266477a3083dca6183dc2bc88da3dd855592a23d1d8a5bf7f2b3c30a5b57e97ac5f151ea2e012773005fb1136403
SHA1 hash: c9a07ff3362a68baa159521c6946026e4cc0f17b
MD5 hash: 1bd78136fa8b9e9e63fde92829a9743d
humanhash: single-chicken-cardinal-venus
File name:charles.exe
Download: download sample
Signature SnakeKeylogger
File size:527'360 bytes
First seen:2023-09-26 13:54:50 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'657 x AgentTesla, 19'468 x Formbook, 12'206 x SnakeKeylogger)
ssdeep 6144:tZQ1L8X3KA0CJIJr/yl8ntd9wxJA4jLXIwejp9R37+RRmpr2MUX9xRjVJiJxeyBc:fQ1BCJIBd6xXIbjp9RSzsr2FgO
TLSH T17AB4279BB324466DC27507B8C192E0E4813CABD81DB1FE637C6B265B1F3B346A653346
TrID 67.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
9.7% (.EXE) Win64 Executable (generic) (10523/12/4)
6.0% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
4.1% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 30f0e0f0e0f0f030 (22 x Formbook, 12 x AgentTesla, 2 x RedLineStealer)
Reporter JAMESWT_WT
Tags:exe payorderreceipt-info SnakeKeylogger

Intelligence


File Origin
# of uploads :
1
# of downloads :
294
Origin country :
IT IT
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
charles.exe
Verdict:
Malicious activity
Analysis date:
2023-09-26 14:05:39 UTC
Tags:
snake evasion

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Unauthorized injection to a recently created process
Restart of the analyzed sample
Running batch commands
Creating a file
Creating a file in the %AppData% subdirectories
Launching a process
Сreating synchronization primitives
DNS request
Sending an HTTP GET request
Reading critical registry keys
Creating a window
Creating a process from a recently created file
Enabling autorun by creating a file
Forced shutdown of a browser
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
obfuscated packed packed smartassembly smart_assembly xworm
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Snake Keylogger
Verdict:
Malicious
Result
Threat name:
Snake Keylogger
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus detection for URL or domain
Connects to many ports of the same IP (likely port scanning)
Drops PE files with benign system names
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Schedule system process
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Generic Downloader
Yara detected Snake Keylogger
Yara detected Telegram RAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1314576 Sample: charles.exe Startdate: 26/09/2023 Architecture: WINDOWS Score: 100 72 product-secured.com 2->72 74 ftp.product-secured.com 2->74 76 2 other IPs or domains 2->76 90 Malicious sample detected (through community Yara rule) 2->90 92 Antivirus detection for URL or domain 2->92 94 Multi AV Scanner detection for submitted file 2->94 96 8 other signatures 2->96 8 svchost.exe 1 2->8         started        11 charles.exe 2 2->11         started        13 svchost.exe 2->13         started        15 2 other processes 2->15 signatures3 process4 signatures5 98 System process connects to network (likely due to code injection or exploit) 8->98 100 Multi AV Scanner detection for dropped file 8->100 102 May check the online IP address of the machine 8->102 104 Machine Learning detection for dropped file 8->104 17 svchost.exe 14 4 8->17         started        29 3 other processes 8->29 106 Injects a PE file into a foreign processes 11->106 21 cmd.exe 2 11->21         started        23 charles.exe 15 5 11->23         started        31 2 other processes 11->31 25 svchost.exe 13->25         started        34 3 other processes 13->34 27 svchost.exe 15->27         started        36 4 other processes 15->36 process6 dnsIp7 58 ftp.product-secured.com 17->58 64 2 other IPs or domains 17->64 78 Uses schtasks.exe or at.exe to add and modify task schedules 21->78 80 Drops PE files with benign system names 21->80 38 conhost.exe 21->38         started        60 checkip.dyndns.com 132.226.8.169, 49775, 49776, 80 UTMEMUS United States 23->60 62 product-secured.com 179.43.183.46, 21, 49578, 49777 PLI-ASCH Panama 23->62 66 2 other IPs or domains 23->66 68 3 other IPs or domains 25->68 82 System process connects to network (likely due to code injection or exploit) 25->82 84 Tries to steal Mail credentials (via file / registry access) 25->84 86 Tries to harvest and steal browser information (history, passwords, etc) 25->86 70 3 other IPs or domains 27->70 40 conhost.exe 29->40         started        42 conhost.exe 29->42         started        50 2 other processes 29->50 56 C:\Users\user\AppData\Roaming\...\svchost.exe, PE32 31->56 dropped 44 conhost.exe 31->44         started        46 conhost.exe 31->46         started        48 schtasks.exe 1 31->48         started        52 4 other processes 34->52 54 4 other processes 36->54 file8 88 May check the online IP address of the machine 58->88 signatures9 process10
Threat name:
Win32.Trojan.Generic
Status:
Malicious
First seen:
2023-09-25 03:54:26 UTC
File Type:
PE (.Net Exe)
Extracted files:
20
AV detection:
22 of 38 (57.89%)
Threat level:
  2/5
Result
Malware family:
snakekeylogger
Score:
  10/10
Tags:
family:snakekeylogger collection keylogger spyware stealer
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Looks up external IP address via web service
Executes dropped EXE
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Snake Keylogger
Snake Keylogger payload
Unpacked files
SH256 hash:
2c0055d48b384b14c08d682478e5329cd3ecedae0e6f0342807cd25b00097e8b
MD5 hash:
364cdb366b16fec2fcb1718c649ae7fb
SHA1 hash:
b546d54371fc1348b4f1298afbca70d23d971ce6
SH256 hash:
fe5c1d889311a86b8c0c29a8585acaf79bef3a03c3db746e582dc21ddda60a07
MD5 hash:
7fe292bc5ea2ef1ec95fbe7c4283b69b
SHA1 hash:
1b4ac2a792855b53db41b4280c4f41f60895a41d
SH256 hash:
995d7782b47ae9d044a0a1edf76a011241ab941c09af6e8a90eeab23f82225e2
MD5 hash:
1bd78136fa8b9e9e63fde92829a9743d
SHA1 hash:
c9a07ff3362a68baa159521c6946026e4cc0f17b
Malware family:
SnakeKeylogger
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_SmartAssembly
Author:ditekSHen
Description:Detects executables packed with SmartAssembly
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

SnakeKeylogger

Executable exe 995d7782b47ae9d044a0a1edf76a011241ab941c09af6e8a90eeab23f82225e2

(this sample)

  
Delivery method
Distributed via web download

Comments