MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 cf504b21ac2e223e0cac9101b54ae1aa40fcd4c5fadcf5f3eacc7edd8aac819a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
SnakeKeylogger
Vendor detections: 18
| SHA256 hash: | cf504b21ac2e223e0cac9101b54ae1aa40fcd4c5fadcf5f3eacc7edd8aac819a |
|---|---|
| SHA3-384 hash: | 7e55fff8df7a7974da98239442e008adf151ae82da826028f864ebb930dc0f3165c46653c45eee9a7a30777a90023f7b |
| SHA1 hash: | e84c3933b7ca0eee93de2224abc08bdc38a95bb5 |
| MD5 hash: | 213210f1d2eb620d5dea124bba5c2cd1 |
| humanhash: | johnny-mars-mississippi-red |
| File name: | cf504b21ac2e223e0cac9101b54ae1aa40fcd4c5fadcf5f3eacc7edd8aac819a |
| Download: | download sample |
| Signature | SnakeKeylogger |
| File size: | 760'832 bytes |
| First seen: | 2025-10-10 06:36:28 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'649 x AgentTesla, 19'455 x Formbook, 12'202 x SnakeKeylogger) |
| ssdeep | 12288:+qx1jZm3qZ2yQaM9AbwQQVRXTIteLA67wHZB7KZ+dPBoC3USn43kCwMQMz6A:vxkWI/9AbwbQeLACwHmZ+dPOaUS40YQW |
| Threatray | 3'421 similar samples on MalwareBazaar |
| TLSH | T1F1F4F14523A9DD11D8F62FF00871E3B813BABE8D7920C3075EE6ACE77425B905A95393 |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10522/11/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4504/4/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| Magika | pebin |
| Reporter | |
| Tags: | exe SnakeKeylogger |
Intelligence
File Origin
HUVendor Threat Intelligence
Result
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | CP_AllMal_Detector |
|---|---|
| Author: | DiegoAnalytics |
| Description: | CrossPlatform All Malwares Detector: Detect PE, ELF, Mach-O, scripts, archives; overlay, obfuscation, encryption, spoofing, hiding, high entropy, network communication |
| Rule name: | crime_snake_keylogger |
|---|---|
| Author: | Rony (r0ny_123) |
| Description: | Detects Snake keylogger payload |
| Rule name: | DetectEncryptedVariants |
|---|---|
| Author: | Zinyth |
| Description: | Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded |
| Rule name: | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_DotNetProcHook |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables with potential process hoocking |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_TelegramChatBot |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables using Telegram Chat Bot |
| Rule name: | MAL_Envrial_Jan18_1 |
|---|---|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects Encrial credential stealer malware |
| Reference: | https://twitter.com/malwrhunterteam/status/953313514629853184 |
| Rule name: | MAL_Envrial_Jan18_1_RID2D8C |
|---|---|
| Author: | Florian Roth |
| Description: | Detects Encrial credential stealer malware |
| Reference: | https://twitter.com/malwrhunterteam/status/953313514629853184 |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | RANSOMWARE |
|---|---|
| Author: | ToroGuitar |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | Sus_CMD_Powershell_Usage |
|---|---|
| Author: | XiAnzheng |
| Description: | May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP) |
| Rule name: | telegram_bot_api |
|---|---|
| Author: | rectifyq |
| Description: | Detects file containing Telegram Bot API |
| Rule name: | Windows_Trojan_SnakeKeylogger_af3faa65 |
|---|---|
| Author: | Elastic Security |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.