MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 c545399c898bb75310af8f052aafc91e44893ff82905d80f3b449321b6c61489. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
SnakeKeylogger
Vendor detections: 16
| SHA256 hash: | c545399c898bb75310af8f052aafc91e44893ff82905d80f3b449321b6c61489 |
|---|---|
| SHA3-384 hash: | 025feefe089a2e4f7bed5f61afd9cbdc6282539b171cbce5297c4ffae9f2d832411fed8ee3e53fbc3fe08d5802391972 |
| SHA1 hash: | ccff8d607eef5159e44fa349fb8fa7e8560600ec |
| MD5 hash: | c580578c2d1d9203d43537f6e71a7c99 |
| humanhash: | seventeen-island-washington-cardinal |
| File name: | TKSC2310596000.exe |
| Download: | download sample |
| Signature | SnakeKeylogger |
| File size: | 557'568 bytes |
| First seen: | 2023-08-04 04:41:51 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger) |
| ssdeep | 12288:2+15YQvjOuVfIQ3e97weN2LhB0iXmVDW0MDhYm5:2+1XOuv3C92LL0iXm+hYm5 |
| Threatray | 5'523 similar samples on MalwareBazaar |
| TLSH | T155C4126962C5EB33F53E83FD64D6D9300B782D2A9401E70CADE5A2E72572FC60681E17 |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10523/12/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4505/5/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| Reporter | |
| Tags: | exe SnakeKeylogger |
Intelligence
File Origin
NLVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Unpacked files
45a3e50d6aa0b1ef6a53d9859056f19c0d1e247986032a976d0b2f2b2a4ddd9b
13de51cacde4de6b1046e4e5c97526aafc09844335e21c4222d9bad5c9822e8c
8244ed884058c24c49955bbe4a8bf1b463491242e3b5a3e5dd0d4b893fa81be3
88c206de26374622c698d34b7b2e96626ad2c9d06d8441b7122e8c0865209fc2
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.