MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 da9da68aedd7dfc3cb324b9c91c2e0ce75ecb7abc0283b1aea395022f277978f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
SnakeKeylogger
Vendor detections: 16
| SHA256 hash: | da9da68aedd7dfc3cb324b9c91c2e0ce75ecb7abc0283b1aea395022f277978f |
|---|---|
| SHA3-384 hash: | 758158089e00efe6a823bfe6c85a00ccb35c64ed757458e694785a4d5b5e3f1cefcc3ffa0c67677422f5282a8ba1cd7b |
| SHA1 hash: | a094f73f5e64b418d77272e248396d6408281ca8 |
| MD5 hash: | fbd56ce2ba130bde239b233150038bbf |
| humanhash: | fourteen-georgia-four-eighteen |
| File name: | Documents.exe |
| Download: | download sample |
| Signature | SnakeKeylogger |
| File size: | 851'456 bytes |
| First seen: | 2023-04-05 09:14:23 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'649 x AgentTesla, 19'452 x Formbook, 12'201 x SnakeKeylogger) |
| ssdeep | 12288:WrC5DaoD0xYcfMy894bCzHbGb937bkNA:WoDf0xrMy89Dj4nk+ |
| Threatray | 5'064 similar samples on MalwareBazaar |
| TLSH | T100054DD1F150C89AED6B06F2AD2B653024E7BE9D54A4810C559EBB1B36F3342209FE1F |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10523/12/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4505/5/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| File icon (PE): | |
| dhash icon | eeacac8cb6e2ba86 (561 x SnakeKeylogger, 142 x AgentTesla, 40 x Formbook) |
| Reporter | |
| Tags: | exe SnakeKeylogger |
Intelligence
File Origin
DEVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_DotNetProcHook |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables with potential process hoocking |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many email and collaboration clients. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_TelegramChatBot |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables using Telegram Chat Bot |
| Rule name: | MALWARE_Win_SnakeKeylogger |
|---|---|
| Author: | ditekSHen |
| Description: | Detects Snake Keylogger |
| Rule name: | MAL_Envrial_Jan18_1 |
|---|---|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects Encrial credential stealer malware |
| Reference: | https://twitter.com/malwrhunterteam/status/953313514629853184 |
| Rule name: | MAL_Envrial_Jan18_1_RID2D8C |
|---|---|
| Author: | Florian Roth |
| Description: | Detects Encrial credential stealer malware |
| Reference: | https://twitter.com/malwrhunterteam/status/953313514629853184 |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | Suspicious_Macro_Presence |
|---|---|
| Author: | Mehmet Ali Kerimoglu (CYB3RMX) |
| Description: | This rule detects common malicious/suspicious implementations. |
| Rule name: | Windows_Trojan_SnakeKeylogger_af3faa65 |
|---|---|
| Author: | Elastic Security |
| Rule name: | XWorm_Hunter |
|---|---|
| Author: | Potato |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.