MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 eafed11950cfd55efd152e4e11dcb1f80ae52c259c42badf8703d1099af96998. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
SnakeKeylogger
Vendor detections: 18
| SHA256 hash: | eafed11950cfd55efd152e4e11dcb1f80ae52c259c42badf8703d1099af96998 |
|---|---|
| SHA3-384 hash: | da4116276bbaa7caac4f3776aa2e830f7e2a16b49eb611073c6722dce7070254155fcc37b885a888766c39274ee8ad02 |
| SHA1 hash: | bf0a3e7c33e514e0de5ff18562ab7116e4e1d2ed |
| MD5 hash: | 3b8d441d8d2f154d2c162886f1b5aee9 |
| humanhash: | six-aspen-high-solar |
| File name: | Vessel Particulars.scr |
| Download: | download sample |
| Signature | SnakeKeylogger |
| File size: | 597'000 bytes |
| First seen: | 2024-05-30 21:47:54 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'649 x AgentTesla, 19'452 x Formbook, 12'201 x SnakeKeylogger) |
| ssdeep | 12288:bQBPJwKcIMFqIPphNi9gnWTwKvacBuDGI47vZH/g6/wmatu+tRvqkR:cBhcXqIViAs3vDBuDGIavZ/Yt/tP |
| Threatray | 275 similar samples on MalwareBazaar |
| TLSH | T117C4235072195320D06A2FB29E79C1922B73FA836635E72AB4CD528F1EE376059F4337 |
| TrID | 63.0% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 11.2% (.SCR) Windows screen saver (13097/50/3) 9.0% (.EXE) Win64 Executable (generic) (10523/12/4) 5.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 3.8% (.EXE) Win32 Executable (generic) (4504/4/1) |
| Reporter | |
| Tags: | exe SnakeKeylogger |
Intelligence
File Origin
CHVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | INDICATOR_KB_CERT_7c1118cbbadc95da3752c46e47a27438 |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables signed with stolen, revoked or invalid certificates |
| Rule name: | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_DotNetProcHook |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables with potential process hoocking |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many email and collaboration clients. Observed in information stealers |
| Rule name: | MALWARE_Win_SnakeKeylogger |
|---|---|
| Author: | ditekSHen |
| Description: | Detects Snake Keylogger |
| Rule name: | MAL_Envrial_Jan18_1 |
|---|---|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects Encrial credential stealer malware |
| Reference: | https://twitter.com/malwrhunterteam/status/953313514629853184 |
| Rule name: | MAL_Envrial_Jan18_1_RID2D8C |
|---|---|
| Author: | Florian Roth |
| Description: | Detects Encrial credential stealer malware |
| Reference: | https://twitter.com/malwrhunterteam/status/953313514629853184 |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | PE_Digital_Certificate |
|---|---|
| Author: | albertzsigovits |
| Rule name: | pe_imphash |
|---|
| Rule name: | PE_Potentially_Signed_Digital_Certificate |
|---|---|
| Author: | albertzsigovits |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | Windows_Trojan_SnakeKeylogger_af3faa65 |
|---|---|
| Author: | Elastic Security |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.