MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 b05928702b9e25087f250648f3d82ae8ec7faa7e3fb4e5ed3538cb39a4f6dbfc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
SnakeKeylogger
Vendor detections: 17
| SHA256 hash: | b05928702b9e25087f250648f3d82ae8ec7faa7e3fb4e5ed3538cb39a4f6dbfc |
|---|---|
| SHA3-384 hash: | c5d559930ec7ad4e52693aae3555916a7e0a5f6e45203b8004a4522ba99ad655bb27d3146cf74f07553ed6019c4a880a |
| SHA1 hash: | 6d3292cdadcdc719f63b92a3da5f025b03b0f05a |
| MD5 hash: | 50b5590312d5a46349745b48fb0d86ff |
| humanhash: | cold-yellow-shade-mike |
| File name: | HK9876780090980000980987678.exe |
| Download: | download sample |
| Signature | SnakeKeylogger |
| File size: | 528'384 bytes |
| First seen: | 2025-05-30 07:33:47 UTC |
| Last seen: | 2025-06-10 11:19:10 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | ef471c0edf1877cd5a881a6a8bf647b9 (73 x Formbook, 33 x Loki, 29 x Loda) |
| ssdeep | 12288:6Ov5jKhsfoPA+yeVKUCUxP4C902bdRtJJPia8KoSPNmD4dfFL:6q5TfcdHj4fmbq2NmDC |
| Threatray | 2'290 similar samples on MalwareBazaar |
| TLSH | T170B412A068C8CC62E9913371D0BBCF910AA97A32ED89775D1B89F51F7473243189277E |
| TrID | 39.1% (.EXE) UPX compressed Win32 Executable (27066/9/6) 38.3% (.EXE) Win32 EXE Yoda's Crypter (26569/9/4) 7.2% (.EXE) Win16 NE executable (generic) (5038/12/1) 6.5% (.EXE) Win32 Executable (generic) (4504/4/1) 2.9% (.EXE) OS/2 Executable (generic) (2029/13) |
| Magika | pebin |
| dhash icon | aae2f3e38383b629 (2'034 x Formbook, 1'183 x CredentialFlusher, 666 x AgentTesla) |
| Reporter | |
| Tags: | exe SnakeKeylogger |
Intelligence
File Origin
DEVendor Threat Intelligence
Result
Behaviour
Result
Signature
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | crime_snake_keylogger |
|---|---|
| Author: | Rony (r0ny_123) |
| Description: | Detects Snake keylogger payload |
| Rule name: | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_DotNetProcHook |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables with potential process hoocking |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many email and collaboration clients. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_TelegramChatBot |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables using Telegram Chat Bot |
| Rule name: | MAL_Envrial_Jan18_1 |
|---|---|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects Encrial credential stealer malware |
| Reference: | https://twitter.com/malwrhunterteam/status/953313514629853184 |
| Rule name: | MAL_Envrial_Jan18_1_RID2D8C |
|---|---|
| Author: | Florian Roth |
| Description: | Detects Encrial credential stealer malware |
| Reference: | https://twitter.com/malwrhunterteam/status/953313514629853184 |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | RANSOMWARE |
|---|---|
| Author: | ToroGuitar |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | Sus_Obf_Enc_Spoof_Hide_PE |
|---|---|
| Author: | XiAnzheng |
| Description: | Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP) |
| Rule name: | telegram_bot_api |
|---|---|
| Author: | rectifyq |
| Description: | Detects file containing Telegram Bot API |
| Rule name: | UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser |
|---|---|
| Author: | malware-lu |
| Rule name: | upx_largefile |
|---|---|
| Author: | k3nr9 |
| Rule name: | Windows_Trojan_SnakeKeylogger_af3faa65 |
|---|---|
| Author: | Elastic Security |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
| CHECK_NX | Missing Non-Executable Memory Protection | critical |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| MULTIMEDIA_API | Can Play Multimedia | WINMM.dll::timeGetTime |
| SECURITY_BASE_API | Uses Security Base API | ADVAPI32.dll::AddAce |
| WIN_BASE_API | Uses Win Base API | KERNEL32.DLL::LoadLibraryA |
| WIN_NETWORK_API | Supports Windows Networking | MPR.dll::WNetUseConnectionW |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.