MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e5d24ac337863467a0ca13a4323c1e2f5ff29d941861df5a900740b7432838dc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



SnakeKeylogger


Vendor detections: 14


Intelligence 14 IOCs YARA 2 File information Comments

SHA256 hash: e5d24ac337863467a0ca13a4323c1e2f5ff29d941861df5a900740b7432838dc
SHA3-384 hash: 2ea2573ce3bf99623d5b946c9a7da83b02cf9e1eaefb8c4c0b512fa08e79d4d59fee641eba46bfbbff27060dc9e4eef3
SHA1 hash: 7936f640ef3eb03b4dd6defe8b008ea43bea6c41
MD5 hash: 3fc540a01a963f4c56a06a9f23544ab6
humanhash: helium-twelve-hamper-violet
File name:dc734646737376-tf048493883929.exe
Download: download sample
Signature SnakeKeylogger
File size:886'272 bytes
First seen:2023-01-16 12:14:44 UTC
Last seen:2023-01-16 15:28:11 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 24576:TILepD6b3ewHdqozEYq3O6kLBKOtWBwCOgPD:TILNb/3uHkLBKOtGPD
Threatray 10'613 similar samples on MalwareBazaar
TLSH T1E8159DE1029DC7D5E8F60E380628391467A99897C37DA17E7ED714BB84F674F40B83A2
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Reporter lowmal3
Tags:exe SnakeKeylogger

Intelligence


File Origin
# of uploads :
3
# of downloads :
173
Origin country :
DE DE
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
dc734646737376-tf048493883929.exe
Verdict:
Malicious activity
Analysis date:
2023-01-16 12:18:04 UTC
Tags:
evasion trojan

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Creating a file
Сreating synchronization primitives
DNS request
Sending an HTTP GET request
Reading critical registry keys
Verdict:
No Threat
Threat level:
  2/10
Confidence:
100%
Tags:
packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Private Blackberry Internal
Verdict:
Malicious
Result
Threat name:
Snake Keylogger
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Yara detected AntiVM3
Yara detected Generic Downloader
Yara detected Snake Keylogger
Yara detected Telegram RAT
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2023-01-16 10:11:12 UTC
File Type:
PE (.Net Exe)
Extracted files:
12
AV detection:
20 of 26 (76.92%)
Threat level:
  5/5
Result
Malware family:
snakekeylogger
Score:
  10/10
Tags:
family:snakekeylogger collection keylogger spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Program crash
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Looks up external IP address via web service
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Snake Keylogger
Snake Keylogger payload
Unpacked files
SH256 hash:
78ef1285a49d5135a18acf79237216217388249148d654aa87466e4913a2a473
MD5 hash:
b884774bed8c259dc61c2bb9100ebc90
SHA1 hash:
b6043c4169e99f8afa7cd89f8f8084e1eeaee4cd
SH256 hash:
7070404b1c0aa59991b41751c827d39152daa6e72a4d2e504d279b1fae01dc43
MD5 hash:
991214f771b573edee489f1d10a7dab6
SHA1 hash:
726b5d5e700afc36daa3b2472c8b7d7c06e991a1
Detections:
snake_keylogger
SH256 hash:
ff1b42ea7d56a37eae801adbddb7116f52a4664c0b41302736f522852edc2747
MD5 hash:
89ac57478044c57c7195943116a521e0
SHA1 hash:
1ff2bafeed795423e3538d810bda8e1e3fcdcfa5
SH256 hash:
757739990721ae75b7c63ef4c321863de6c3e5149467f097cd27699b2d99891b
MD5 hash:
24d8652cab672b700bbe07208e6cd548
SHA1 hash:
0b932ef5cc34ab318d682556d0209cf43f7a494a
SH256 hash:
2ad0882eca51e8d55f0a8bf92ff0ade555eabbd16a7984a0c1df53baf34bba78
MD5 hash:
17d4b7b6ea3cf80d3efe0ec9c8181db3
SHA1 hash:
094e673687a63c7ee55aa217d022d04824cc38af
SH256 hash:
e5d24ac337863467a0ca13a4323c1e2f5ff29d941861df5a900740b7432838dc
MD5 hash:
3fc540a01a963f4c56a06a9f23544ab6
SHA1 hash:
7936f640ef3eb03b4dd6defe8b008ea43bea6c41
Malware family:
SnakeKeylogger
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

SnakeKeylogger

Executable exe e5d24ac337863467a0ca13a4323c1e2f5ff29d941861df5a900740b7432838dc

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments