MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 a29feb5a19c2eb1dd0a09402eabca6d9a721c4f46e5f1ec013e36ee3069e0f3d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
SnakeKeylogger
Vendor detections: 17
| SHA256 hash: | a29feb5a19c2eb1dd0a09402eabca6d9a721c4f46e5f1ec013e36ee3069e0f3d |
|---|---|
| SHA3-384 hash: | 20fd5fedb3d4aaa2029103c3d964ff7a1f317f2d618c1b574dbc5ee748963e0a06678259d5393d5d8fd8d5adeb2efcee |
| SHA1 hash: | a07ba1196b62384f21eaffbcda2bccd5ce5ae8fd |
| MD5 hash: | 0b662c4fa6865088e3b4f6c1333f32bb |
| humanhash: | october-south-happy-sweet |
| File name: | NDhcNzYq860Q9EI.exe |
| Download: | download sample |
| Signature | SnakeKeylogger |
| File size: | 761'352 bytes |
| First seen: | 2025-03-31 07:06:20 UTC |
| Last seen: | 2025-03-31 13:16:13 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'649 x AgentTesla, 19'452 x Formbook, 12'202 x SnakeKeylogger) |
| ssdeep | 12288:ZwlZhRgepbCiBcDzZU/ooJiwAJphpspiPha3KCF85zqYuuLZ2z/OZIiaa86RkR:kaeYiB8zZz4fAJphpsgYKp5zqBuN2zC4 |
| Threatray | 3'211 similar samples on MalwareBazaar |
| TLSH | T1FFF412DC7B16C403C9956BB40772F77A1A685EDEF410C3075BDCADBBB8B96260E14282 |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10522/11/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4504/4/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| Magika | pebin |
| dhash icon | b2b296b2b29696b2 (1 x AgentTesla, 1 x RemcosRAT, 1 x SnakeKeylogger) |
| Reporter | Anonymous |
| Tags: | exe SnakeKeylogger |
Intelligence
File Origin
PLVendor Threat Intelligence
Result
Behaviour
Result
Signature
Behaviour
Result
Behaviour
Unpacked files
ab68d4e831745aa5364ad14203a0a9669a5362913b09263eb4e06681f62007c5
1792b62467af9326272e0190ddd1e22c6217f23637ab47b9fbe0098ca3800c6d
8e4108d867c054d193cca6c2f9fcfa7288d7a1b9e6ac9e41ae60cfd15b1e0572
a29feb5a19c2eb1dd0a09402eabca6d9a721c4f46e5f1ec013e36ee3069e0f3d
0d53038edfae7a4ff9c96ade284680a5a46c5958942262357c89f0740ad02458
9899807e67d1974a32123f6967f1c46c05f8c0769f5c1ba5127f966a697a2c77
69f684f1e3a4c73362a0e9d775ec1717be3e730bee70a096b578775c0df39ddf
755f9071cf58c7d3729758cc3143fcd738b813977ca81ef2067a27e113881a9d
3ab9c6d950c228d286795fd61b70a4bd7c1c3de889ccac47dc68d5f23a24408e
3543cb3f9359037b6f177ab44ef175f17017381b33759d9709b46268f248012a
a6d1bf193f5a5f2f6f9e766dffb51b66122e96dc8d2b76c3674fe2968d32c811
0ca81feea4b45d3c004c6f98c4d092227dd5c0a32044f19956117f9ee4dbc749
2bc972f3ec09f8d1bdc1b25a3fe57db9a08577117d3a0d0ce5e5282e976d9111
64298970a96368b940e957cef55f70a07d63151df38c3b73818e83c4a4caebf6
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | crime_snake_keylogger |
|---|---|
| Author: | Rony (r0ny_123) |
| Description: | Detects Snake keylogger payload |
| Rule name: | INDICATOR_KB_CERT_7c1118cbbadc95da3752c46e47a27438 |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables signed with stolen, revoked or invalid certificates |
| Rule name: | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_DotNetProcHook |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables with potential process hoocking |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many email and collaboration clients. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_TelegramChatBot |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables using Telegram Chat Bot |
| Rule name: | MAL_Envrial_Jan18_1 |
|---|---|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects Encrial credential stealer malware |
| Reference: | https://twitter.com/malwrhunterteam/status/953313514629853184 |
| Rule name: | MAL_Envrial_Jan18_1_RID2D8C |
|---|---|
| Author: | Florian Roth |
| Description: | Detects Encrial credential stealer malware |
| Reference: | https://twitter.com/malwrhunterteam/status/953313514629853184 |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | PE_Digital_Certificate |
|---|---|
| Author: | albertzsigovits |
| Rule name: | pe_imphash |
|---|
| Rule name: | RANSOMWARE |
|---|---|
| Author: | ToroGuitar |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | Sus_Obf_Enc_Spoof_Hide_PE |
|---|---|
| Author: | XiAnzheng |
| Description: | Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP) |
| Rule name: | telegram_bot_api |
|---|---|
| Author: | rectifyq |
| Description: | Detects file containing Telegram Bot API |
| Rule name: | Windows_Trojan_SnakeKeylogger_af3faa65 |
|---|---|
| Author: | Elastic Security |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (GUARD_CF) | high |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.