MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 9d020d9aa66b2f0f5ed13065b7d9a8413e8834fc77d78572f4e280965758ae42. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
SnakeKeylogger
Vendor detections: 20
| SHA256 hash: | 9d020d9aa66b2f0f5ed13065b7d9a8413e8834fc77d78572f4e280965758ae42 |
|---|---|
| SHA3-384 hash: | c9f074f50580a94dc97790521a938436eadb5d32a24e80f2a7a5efa2fbc3945b71ceb536c4cfb8390d6690ab2a284bc7 |
| SHA1 hash: | 9f9091a21c8a69a96f56268cf89040ff7fc73e3e |
| MD5 hash: | a7fed3543f9d6722d7eb75864a995308 |
| humanhash: | uncle-high-cold-twenty |
| File name: | Document Fvat 2532_PL_2025 2025-11-07_253510_ Original.docx.exe |
| Download: | download sample |
| Signature | SnakeKeylogger |
| File size: | 565'248 bytes |
| First seen: | 2025-11-07 09:26:32 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'744 x AgentTesla, 19'611 x Formbook, 12'242 x SnakeKeylogger) |
| ssdeep | 12288:leRPALpVOo1AfnEiUr+sYvNLSp2yCE2AnE51LlkJGz/lwC:l+YLOCAfjsYvsAJA2l7z/lw |
| Threatray | 3'756 similar samples on MalwareBazaar |
| TLSH | T1BBC412582B9CCB13D8A66BF029B2E27413746EAEA460C7178FEDEDDF38267115014B53 |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10522/11/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4504/4/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| Magika | pebin |
| Reporter | Anonymous |
| Tags: | exe SnakeKeylogger |
Intelligence
File Origin
PLVendor Threat Intelligence
Result
Behaviour
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files
5310cbf5067a34b198535c5245be1a08296ce9525ce7748fa9ffc91f246fe9db
86bab321000ab08a9bc5c2eb689c46f779fe62763a0a3fb44b3b79dc958b203d
2675cf7ad014da2525a0fd9ac10362a6b5f8ce33375d0225d299ed2342e196e0
d41a54ee9f6f0de81009d98955fdd03cc7458ef3089bd4d21f8a1fc167f72928
8565683618c7ee771b85070d5694bc041ec25aa7086ce04a44135a81493e3970
d7911c750b95eda25760d99dbc911f231f831492be7f55ee2620c25e85d01dee
4dd4dc6e537cd6431e9f5b84a99a81349e2aa2816dc2c95db9590ee958acd05d
9d020d9aa66b2f0f5ed13065b7d9a8413e8834fc77d78572f4e280965758ae42
45f1f0c4c76cee479f0bb2966f4d9c157e344f9749cdfeb5e4b396aa3285c18d
b2b9e06249eca4b3378f0fcc6b2dbf3fe279f8d2e803f053a406c1de4145623d
6c09b777df1a95bac8b74f67909ea7a24dd048d58847003546ccef328f72aff6
ef2ef9c4bbc252a65d09f98c7dfe0c89a004bf4df3ccc3dcf65230cfcadf580f
218828c21b545913e8527389ce353dadb66e463c9e2e2c9c98d637153bd86db4
628a3c3cbfd3a17bb69a617224e33d239729ced5665091578bf96cde788155c3
d96541e0ccbe6b139e9cc92a198fbe5e759e37369ad0fa0233828afefe8cdd34
2d5dae8b1dedfc3530d6e029d9002235fd4faa83d9b8df3085b65d218254d00f
53d16df25904875b4098b1c6bc0428f5ac03d97c6d84789abb3bda3307eb23bb
e754d67774ff854e5f55ff42cb501d22ecf5e8ea38d646d32da5140c8ec63e3a
1ab2dcf7cb3e420b599a2d8e45a6f4097174fa23cf8a3d577477a7ad30a62711
6d241d6d124be9a53918a2cc62266e6bb0276c6911d1fe44672aaf018e96f8ee
9d020d9aa66b2f0f5ed13065b7d9a8413e8834fc77d78572f4e280965758ae42
869bf087a9bf33800b03f3b2ee202abc55fdb152fdee40a3d3096e28803669f6
19abf0b7ca52d87aeaa50c0913dd83ccdf51170836665022b90c4eccf0fd872c
d6081a0c16187f94f3b9763e7b41aecca9ae175815ead5cbc155bdbd69640fef
a2a18a09a6f7b1e3e4210eda27c1a9ed20572829148d8aeffe26f68d9f1abba8
3f41a780ac5cd36e7f26d75386e53f02de9896fbbc3e9c0e8cb9a23dbd053237
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | crime_snake_keylogger |
|---|---|
| Author: | Rony (r0ny_123) |
| Description: | Detects Snake keylogger payload |
| Rule name: | DetectEncryptedVariants |
|---|---|
| Author: | Zinyth |
| Description: | Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded |
| Rule name: | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_DotNetProcHook |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables with potential process hoocking |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many email and collaboration clients. Observed in information stealers |
| Rule name: | MALWARE_Win_SnakeKeylogger |
|---|---|
| Author: | ditekSHen |
| Description: | Detects Snake Keylogger |
| Rule name: | MAL_Envrial_Jan18_1 |
|---|---|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects Encrial credential stealer malware |
| Reference: | https://twitter.com/malwrhunterteam/status/953313514629853184 |
| Rule name: | MAL_Envrial_Jan18_1_RID2D8C |
|---|---|
| Author: | Florian Roth |
| Description: | Detects Encrial credential stealer malware |
| Reference: | https://twitter.com/malwrhunterteam/status/953313514629853184 |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | RANSOMWARE |
|---|---|
| Author: | ToroGuitar |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | Sus_CMD_Powershell_Usage |
|---|---|
| Author: | XiAnzheng |
| Description: | May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP) |
| Rule name: | Windows_Trojan_SnakeKeylogger_af3faa65 |
|---|---|
| Author: | Elastic Security |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.