MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 e09602a4f8e956bcadcefd160458c0e669d176a1915edb9715e7d7aee549efed. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
SnakeKeylogger
Vendor detections: 15
| SHA256 hash: | e09602a4f8e956bcadcefd160458c0e669d176a1915edb9715e7d7aee549efed |
|---|---|
| SHA3-384 hash: | 14e9fcace852e70ae75243f657a199cd07538d9b32c4761ab923e8ce071ece11bd6c1b3d70eb95b47ede3ef6fe37669a |
| SHA1 hash: | 16c7f45b6bbf268fe217e94799d1978aa0d0d785 |
| MD5 hash: | e7c8d66e5e4f6c4180751dc318c81c9e |
| humanhash: | comet-west-vermont-charlie |
| File name: | Payment copy.exe |
| Download: | download sample |
| Signature | SnakeKeylogger |
| File size: | 577'536 bytes |
| First seen: | 2023-05-11 18:30:17 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'665 x AgentTesla, 19'478 x Formbook, 12'208 x SnakeKeylogger) |
| ssdeep | 12288:++qUim4rC7Yv66yxzmC1SBg8i2M4+A013jjFSrZii:dimQCoyxzmNnMXljJL |
| Threatray | 1'088 similar samples on MalwareBazaar |
| TLSH | T14AC4CF84523BBFE2D96427F1225434524B7DA11A74F8F0BC6D6BB4C9C8EAB104BD4B63 |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10523/12/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4505/5/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| Reporter | |
| Tags: | exe SnakeKeylogger |
Intelligence
File Origin
# of uploads :
1
# of downloads :
249
Origin country :
NLVendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Payment copy.exe
Verdict:
Malicious activity
Analysis date:
2023-05-11 18:30:50 UTC
Tags:
snake keylogger trojan evasion
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
Snake
Detection(s):
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a window
Сreating synchronization primitives
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Adding an access-denied ACE
Creating a process from a recently created file
Creating a process with a hidden window
Launching a process
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Tags:
barys comodo lokibot packed
Verdict:
Malicious
Labled as:
Win/malicious_confidence_100%
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Snake Keylogger
Verdict:
Malicious
Result
Threat name:
Snake Keylogger
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Found malware configuration
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Generic Downloader
Yara detected Snake Keylogger
Yara detected Telegram RAT
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.SnakeKeylogger
Status:
Malicious
First seen:
2023-05-11 18:31:12 UTC
File Type:
PE (.Net Exe)
Extracted files:
9
AV detection:
17 of 24 (70.83%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Similar samples:
+ 1'078 additional samples on MalwareBazaar
Result
Malware family:
snakekeylogger
Score:
10/10
Tags:
family:snakekeylogger collection keylogger spyware stealer
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Looks up external IP address via web service
Checks computer location settings
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Snake Keylogger
Snake Keylogger payload
Malware Config
C2 Extraction:
https://api.telegram.org/bot6201063260:AAFNunaDOhtoeTfrWIWz56huyZbdHssBU3s/sendMessage?chat_id=5932819427
Unpacked files
SH256 hash:
7d315560fe6dd2b7ca6214d539a540938cb148969628ede47f9348f882033a4b
MD5 hash:
9ee7ebc404ce9aa851693ac5302fc0e9
SHA1 hash:
feed60fd6a8ad99b0d41d5e9be3541b0f67af93d
SH256 hash:
3ab1dcc37e7c5c643bf41e9f0f81f816f24974fbddde95e2af52426e3374dd35
MD5 hash:
8a2c496875c0871aecc16aae768b323f
SHA1 hash:
f5423a32125c70b512de301c5616c7b75477e2e7
SH256 hash:
b780b229d13dd68e7e19fe4a3aaba337272e427e4cd31836d6b0b2604bd69635
MD5 hash:
460070ac0889770ecbbe929c28ce1cda
SHA1 hash:
e4f6177986db1d9e7c9971d038e6b52c24eedfb7
SH256 hash:
94e55544403b1dd8461dbc405f231625c8f8fc4114bb8477a988dfd89731b070
MD5 hash:
4483a53c8760130b940b5a8bcecb71e7
SHA1 hash:
9d3ebdc71bdb539add9325f4211dc4dad48cc21d
Detections:
snake_keylogger
Parent samples :
eab658dc337806cf9d581da4cb44cfdea0a7ed1d9a5007848faeaa0b624fed3b
eb9b75de38d85a10701424dccef23e23ed5fe323b52871cde5b4054f4dc6c087
4018954cd403dd6290586606332d069967bb4bad1302bf071475d94423aaaa1e
5027d53a0f057968982a4c2610a105ce2fe89d9e2de1ffc70177c750be3a8385
d7f55b222b8d9a235401bc900230aff5b37da8cc7e9431459da35b380c5c55bf
203c54db6ea49b332902effc5e4b8c9365f966bd744b00372da7baef4b45184e
87405f169e42b52d9561d79b89f6898cc735f0edc26905baecf21673244455ad
e09602a4f8e956bcadcefd160458c0e669d176a1915edb9715e7d7aee549efed
eb9b75de38d85a10701424dccef23e23ed5fe323b52871cde5b4054f4dc6c087
4018954cd403dd6290586606332d069967bb4bad1302bf071475d94423aaaa1e
5027d53a0f057968982a4c2610a105ce2fe89d9e2de1ffc70177c750be3a8385
d7f55b222b8d9a235401bc900230aff5b37da8cc7e9431459da35b380c5c55bf
203c54db6ea49b332902effc5e4b8c9365f966bd744b00372da7baef4b45184e
87405f169e42b52d9561d79b89f6898cc735f0edc26905baecf21673244455ad
e09602a4f8e956bcadcefd160458c0e669d176a1915edb9715e7d7aee549efed
SH256 hash:
0159599bacefa02e0aedff5b68df04ee986d281cb8516445fbb54df788a15758
MD5 hash:
b4a867eb94be5f9b65bae378219ac31c
SHA1 hash:
974f46c6429a23c2dc7c66d06931e7fa3d68f86b
SH256 hash:
e09602a4f8e956bcadcefd160458c0e669d176a1915edb9715e7d7aee549efed
MD5 hash:
e7c8d66e5e4f6c4180751dc318c81c9e
SHA1 hash:
16c7f45b6bbf268fe217e94799d1978aa0d0d785
Malware family:
SnakeKeylogger
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Password Stealer
Score:
0.90
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.