MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 bedc22afe7af1a669be2b39bde9200bef6e90d97e41a172cc326813cf1fc7f25. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
SnakeKeylogger
Vendor detections: 15
| SHA256 hash: | bedc22afe7af1a669be2b39bde9200bef6e90d97e41a172cc326813cf1fc7f25 |
|---|---|
| SHA3-384 hash: | cb6b98edcb8520c14f1e9765257f703cb12f07514dfc471655d1e6b9f4e11abed635075dfe62ff71547515157f05e5f0 |
| SHA1 hash: | 01e921470e70405cb263b14b22fcb8e2e791a469 |
| MD5 hash: | cbbe9b826c56a06ae6f5f0185c1d68aa |
| humanhash: | tennessee-oklahoma-equal-avocado |
| File name: | details info.exe |
| Download: | download sample |
| Signature | SnakeKeylogger |
| File size: | 784'896 bytes |
| First seen: | 2025-07-28 07:47:28 UTC |
| Last seen: | 2025-08-03 20:31:48 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'649 x AgentTesla, 19'461 x Formbook, 12'202 x SnakeKeylogger) |
| ssdeep | 12288:l/pOv8Wn0NVUKd5Z9H6txA2GZsGek83eXH0JV05TNMqsloWoi/K0UgkBUmc1T29J:u6UKd5Zd9zy3k8w0JV05c5e0pAUmc5x |
| TLSH | T188F4BE3035AE8963D96596F10520E17537A72ECF742AEADA4EC67CCB3CE1BC01B50A17 |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10522/11/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4504/4/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| Magika | pebin |
| dhash icon | 00e425252425e400 (12 x SnakeKeylogger, 9 x Formbook, 2 x DCRat) |
| Reporter | |
| Tags: | exe SnakeKeylogger |
Intelligence
File Origin
HUVendor Threat Intelligence
Result
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | crime_snake_keylogger |
|---|---|
| Author: | Rony (r0ny_123) |
| Description: | Detects Snake keylogger payload |
| Rule name: | DetectEncryptedVariants |
|---|---|
| Author: | Zinyth |
| Description: | Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded |
| Rule name: | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_DotNetProcHook |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables with potential process hoocking |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_TelegramChatBot |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables using Telegram Chat Bot |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | RANSOMWARE |
|---|---|
| Author: | ToroGuitar |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | Sus_CMD_Powershell_Usage |
|---|---|
| Author: | XiAnzheng |
| Description: | May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP) |
| Rule name: | Sus_Obf_Enc_Spoof_Hide_PE |
|---|---|
| Author: | XiAnzheng |
| Description: | Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP) |
| Rule name: | telegram_bot_api |
|---|---|
| Author: | rectifyq |
| Description: | Detects file containing Telegram Bot API |
| Rule name: | Windows_Trojan_SnakeKeylogger_af3faa65 |
|---|---|
| Author: | Elastic Security |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (GUARD_CF) | high |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.