MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b396a85d3f30245a01b4eaec6c369b6753adaae44f7574d443ce83f5d1d4332f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



SnakeKeylogger


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: b396a85d3f30245a01b4eaec6c369b6753adaae44f7574d443ce83f5d1d4332f
SHA3-384 hash: 824c00f707d8a0f170ecbcad0b1317a267323b2c4f5b89f6b6d359f68d7fecad0c8b5e04fd3a87858e5fd77b419abc98
SHA1 hash: f428dd459690d4cbe76f7bf252a239f0fd42f931
MD5 hash: 532b34cabdbca2554ef8249e7c0b1421
humanhash: october-beryllium-colorado-twelve
File name:04142021_10RD0207S0N0000,pdf.exe
Download: download sample
Signature SnakeKeylogger
File size:312'320 bytes
First seen:2021-09-13 12:15:45 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 2c58cc87277520c45be866d28ef20045 (2 x AveMariaRAT, 2 x AgentTesla, 1 x Loki)
ssdeep 6144:xivbiLAlmZrKB+0r25RP5EUrnFcY0s9tyBtMpE+O17krP4sUUj4neFMje:fnmB+0KfSUrnX0CtyohO5kbj4u
Threatray 1'861 similar samples on MalwareBazaar
TLSH T19A64CF1673A5EAA0E09848B53446EBA29110BC7D166FE453B3C03B6F39317DE8A53F47
Reporter malwarelabnet
Tags:exe SnakeKeylogger

Intelligence


File Origin
# of uploads :
1
# of downloads :
101
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
04142021_10RD0207S0N0000,pdf.exe
Verdict:
Malicious activity
Analysis date:
2021-09-13 12:16:30 UTC
Tags:
evasion trojan snakekeylogger keylogger

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Snake Keylogger
Detection:
malicious
Classification:
spre.troj.spyw.evad
Score:
100 / 100
Signature
.NET source code references suspicious native API functions
Found malware configuration
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
May check the online IP address of the machine
Multi AV Scanner detection for submitted file
Sigma detected: MSBuild connects to smtp port
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Yara detected Snake Keylogger
Yara detected Telegram RAT
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.LokiBot
Status:
Malicious
First seen:
2021-09-13 02:44:55 UTC
AV detection:
16 of 45 (35.56%)
Threat level:
  5/5
Result
Malware family:
snakekeylogger
Score:
  10/10
Tags:
family:snakekeylogger keylogger stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Looks up external IP address via web service
Snake Keylogger
Unpacked files
SH256 hash:
00b76558e8ae0fb293cf67523512ac6d70aaf86d8d7b3ad084abcc7ee4a88f25
MD5 hash:
60d9a075279e24d16a1ea042cbf0184b
SHA1 hash:
a3a2b3ec36c4b765d78f3bddc1ec16da49799544
SH256 hash:
b396a85d3f30245a01b4eaec6c369b6753adaae44f7574d443ce83f5d1d4332f
MD5 hash:
532b34cabdbca2554ef8249e7c0b1421
SHA1 hash:
f428dd459690d4cbe76f7bf252a239f0fd42f931
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments