MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 dc1fac12b351fb002bdb989e60717c36e2bd50c6c96b449fbffeb347c47622a5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



SnakeKeylogger


Vendor detections: 14


Intelligence 14 IOCs YARA 12 File information Comments

SHA256 hash: dc1fac12b351fb002bdb989e60717c36e2bd50c6c96b449fbffeb347c47622a5
SHA3-384 hash: ef935512462a11aac254bfab9f6eead789bd60422187c0eabd2732f564b38353e2292f46ac9e8e9edfff9fd7516deffd
SHA1 hash: a4fd9f3d9011dc96a8bbd8f52417f9ef893d9a93
MD5 hash: 317643cc6e21363cec551bae9aab5540
humanhash: indigo-pasta-pizza-magnesium
File name:SWT00009900.exe
Download: download sample
Signature SnakeKeylogger
File size:7'689'528 bytes
First seen:2023-05-05 11:23:44 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 9cbefe68f395e67356e2a5d8d1b285c0 (58 x LummaStealer, 49 x AuroraStealer, 35 x Vidar)
ssdeep 98304:ZfgKNqPKySSmfGxWQ7Jhqf72h85A0gB2qTdB:Z4KXD0fqf72h8i2qTdB
Threatray 5'073 similar samples on MalwareBazaar
TLSH T187768C80FDCF24F5EA43153048A7627F63356D094B25DBC7EA14BF6AE873A910E32649
TrID 40.3% (.EXE) Win64 Executable (generic) (10523/12/4)
19.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
17.2% (.EXE) Win32 Executable (generic) (4505/5/1)
7.7% (.EXE) OS/2 Executable (generic) (2029/13)
7.6% (.EXE) Generic Win/DOS Executable (2002/3)
Reporter abuse_ch
Tags:exe signed SnakeKeylogger

Code Signing Certificate

Organisation:ApolloCA
Issuer:KoraySec Root CA
Algorithm:sha256WithRSAEncryption
Valid from:2023-04-30T07:06:51Z
Valid to:2024-04-29T07:06:51Z
Serial number: 01040503
Intelligence: 7 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: 2fba8aab2375065d2126e12a1273b19d27dad53f2d6c983c0fd66b7f2b04c11c
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
232
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
SWT00009900.exe
Verdict:
Malicious activity
Analysis date:
2023-05-05 11:40:57 UTC
Tags:
snake keylogger trojan evasion

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Launching a process
DNS request
Sending a custom TCP request
Creating a file in the %temp% directory
Creating a process from a recently created file
Сreating synchronization primitives
Creating a file
Sending an HTTP GET request
Searching for synchronization primitives
Reading critical registry keys
Creating a window
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Unauthorized injection to a system process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
golang greyware overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Snake Keylogger, Umbral Stealer
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for dropped file
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Generic Downloader
Yara detected MSILDownloaderGeneric
Yara detected Snake Keylogger
Yara detected Telegram RAT
Yara detected Umbral Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 860212 Sample: SWT00009900.exe Startdate: 05/05/2023 Architecture: WINDOWS Score: 100 43 Snort IDS alert for network traffic 2->43 45 Found malware configuration 2->45 47 Malicious sample detected (through community Yara rule) 2->47 49 6 other signatures 2->49 9 SWT00009900.exe 2 2->9         started        process3 dnsIp4 41 cdn.discordapp.com 162.159.130.233, 443, 49684 CLOUDFLARENETUS United States 9->41 31 C:\Users\user\AppData\Local\Temp\xx.exe, PE32 9->31 dropped 51 Writes to foreign memory regions 9->51 53 Allocates memory in foreign processes 9->53 55 Injects a PE file into a foreign processes 9->55 14 xx.exe 1 9->14         started        17 MSBuild.exe 15 2 9->17         started        20 conhost.exe 9->20         started        file5 signatures6 process7 dnsIp8 57 Antivirus detection for dropped file 14->57 59 Multi AV Scanner detection for dropped file 14->59 61 May check the online IP address of the machine 14->61 69 3 other signatures 14->69 22 xx.exe 14 2 14->22         started        25 xx.exe 14->25         started        33 checkip.dyndns.com 132.226.8.169, 49685, 80 UTMEMUS United States 17->33 35 checkip.dyndns.org 17->35 63 Tries to steal Mail credentials (via file / registry access) 17->63 65 Tries to harvest and steal ftp login credentials 17->65 67 Tries to harvest and steal browser information (history, passwords, etc) 17->67 signatures9 process10 dnsIp11 37 ip-api.com 208.95.112.1, 49687, 80 TUT-ASUS United States 22->37 39 192.168.2.1 unknown unknown 22->39 27 WMIC.exe 1 22->27         started        process12 process13 29 conhost.exe 27->29         started       
Result
Malware family:
snakekeylogger
Score:
  10/10
Tags:
family:snakekeylogger collection keylogger stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Looks up external IP address via web service
Executes dropped EXE
Loads dropped DLL
Snake Keylogger
Snake Keylogger payload
Malware Config
C2 Extraction:
https://api.telegram.org/bot5801425382:AAG5b4PUEaqNDv5uP9ejZGeIHeuzzOD4IHY/sendMessage?chat_id=5812329204
Unpacked files
SH256 hash:
326421d2307ec438181f32c586a648a1a36aaf9a2c7cc2407697535c5154f847
MD5 hash:
a9c770618a3d11583811d2f78505333f
SHA1 hash:
b3be70f2af3b3de5936acb2ead0f95cdeba71150
Detections:
snake_keylogger
Parent samples :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 hash:
dc1fac12b351fb002bdb989e60717c36e2bd50c6c96b449fbffeb347c47622a5
MD5 hash:
317643cc6e21363cec551bae9aab5540
SHA1 hash:
a4fd9f3d9011dc96a8bbd8f52417f9ef893d9a93
Malware family:
SnakeKeylogger
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:command_and_control
Author:CD_R0M_
Description:This rule searches for common strings found by malware using C2. Based on a sample used by a Ransomware group
Rule name:dsc
Author:Aaron DeVera
Description:Discord domains
Rule name:GoBinTest
Rule name:golang
Rule name:Golangmalware
Author:Dhanunjaya
Description:Malware in Golang
Rule name:golang_binary_string
Description:Golang strings present
Rule name:HiveRansomware
Author:Dhanunjaya
Description:Yara Rule To Detect Hive V4 Ransomware
Rule name:identity_golang
Author:Eric Yocam
Description:find Golang malware
Rule name:INDICATOR_SUSPICIOUS_EXE_DiscordURL
Author:ditekSHen
Description:Detects executables Discord URL observed in first stage droppers
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits
Rule name:SUSP_Websites
Author:SECUINFRA Falcon Team
Description:Detects the reference of suspicious sites that might be used to download further malware

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments