MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f23652cc23d3efae55a170f45f3c2eedf46c7013745445e415fc091a20d8b93e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



SnakeKeylogger


Vendor detections: 10


Intelligence 10 IOCs YARA 2 File information Comments

SHA256 hash: f23652cc23d3efae55a170f45f3c2eedf46c7013745445e415fc091a20d8b93e
SHA3-384 hash: b4e461da3c30a9cca6f5ec3a15b034edbb3a1462f6f76811b2de25e86512c79c370e24901f11e409015a52b1087fd6be
SHA1 hash: a4c3bd20a8ab43aefe180e1b9481e65d3963378a
MD5 hash: c948269a4aa3efebcd455bbde5de51fa
humanhash: venus-spaghetti-lion-maryland
File name:angelzx.exe
Download: download sample
Signature SnakeKeylogger
File size:562'688 bytes
First seen:2022-07-20 12:20:23 UTC
Last seen:2022-07-20 16:34:01 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'666 x AgentTesla, 19'479 x Formbook, 12'209 x SnakeKeylogger)
ssdeep 12288:RBk831hdxJMPXNCckv8er5cRBllZv0i0:0Q3iXMV5k/8i0
Threatray 3'757 similar samples on MalwareBazaar
TLSH T152C4E00036BC9FA2D57D9BFD1465A48013F6275B612DE7190ED3B4EF2A3AF150A50E0B
TrID 64.2% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
11.5% (.SCR) Windows screen saver (13101/52/3)
9.2% (.EXE) Win64 Executable (generic) (10523/12/4)
5.7% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
3.9% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon b271c0cccccc61b2 (16 x AgentTesla, 8 x Loki, 8 x SnakeKeylogger)
Reporter Anonymous
Tags:exe SnakeKeylogger

Intelligence


File Origin
# of uploads :
4
# of downloads :
267
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Creating a window
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Snake Keylogger
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Behaviour
Behavior Graph:
n/a
Threat name:
ByteCode-MSIL.Spyware.SnakeLogger
Status:
Malicious
First seen:
2022-07-20 12:21:11 UTC
File Type:
PE (.Net Exe)
Extracted files:
28
AV detection:
21 of 26 (80.77%)
Threat level:
  2/5
Result
Malware family:
snakekeylogger
Score:
  10/10
Tags:
family:snakekeylogger collection keylogger spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Looks up external IP address via web service
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Snake Keylogger
Snake Keylogger payload
Malware Config
C2 Extraction:
https://api.telegram.org/bot5321688653:AAEI2yqGrOA_-sRZ3xaqutrexraSgFa0AnA/sendMessage?chat_id=5048077662
Unpacked files
SH256 hash:
39c2d879c57f07305ce60412dc8a88f02e51f1a14a06cc605768d1d7f5313807
MD5 hash:
db51fe170a9e5d6ec5429a2fbd9d0353
SHA1 hash:
e30a58125fc41322db6cf2ccb6a6d414ed379016
SH256 hash:
78183226881cc638f0b521cf99e5af7e564bb1a401272b87a68fbb0aef1a7093
MD5 hash:
f01accd1334264867d0d87dbec327ff8
SHA1 hash:
90d1ba8c562a8d970362b03051c393a30a75f708
SH256 hash:
ca4e3745f87ae419e10fa9dd15e9814f66a7dca601ae70bd3ae3b0b0781e9491
MD5 hash:
6491ab64072f34a6124f4cdf1d9bdd43
SHA1 hash:
78008e0c188d1732ebb5bbfe6d15892ebe32b1f7
SH256 hash:
c6ffd4f6550606944f55e0abd874ce1d36ba7769fb6b47b722bc5da441da025a
MD5 hash:
cb7a25d0065796a83b779ed415e742fd
SHA1 hash:
73785a054c18c20252a52fbf0b94f044f02bc901
SH256 hash:
425928ec37db60ed19d40ffff7614a11c24b220dd95386db40810f38eed50e74
MD5 hash:
19f6e027abf32862ee499c484a9f630c
SHA1 hash:
419270232561ccbe83015bc960bdf2658029c0f8
SH256 hash:
f23652cc23d3efae55a170f45f3c2eedf46c7013745445e415fc091a20d8b93e
MD5 hash:
c948269a4aa3efebcd455bbde5de51fa
SHA1 hash:
a4c3bd20a8ab43aefe180e1b9481e65d3963378a
Malware family:
SnakeKeylogger
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

SnakeKeylogger

Executable exe f23652cc23d3efae55a170f45f3c2eedf46c7013745445e415fc091a20d8b93e

(this sample)

  
Delivery method
Distributed via web download

Comments