MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f5908b0df1dd1a1b0c09d713294ed1328160f4f57e0e49abd17ef96a5b614d64. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



SnakeKeylogger


Vendor detections: 6


Intelligence 6 IOCs YARA 3 File information Comments

SHA256 hash: f5908b0df1dd1a1b0c09d713294ed1328160f4f57e0e49abd17ef96a5b614d64
SHA3-384 hash: 68f5a44ad3dc7f3dcdb2fc8f65269b91d1f56bb790dcfbb909ad1544c7d29a453fdf494901e08fcffe152da49026a36f
SHA1 hash: 21f8905d1f854a34008a10ec58b5d3240d6e77b2
MD5 hash: f7570ed77fd1fd0aadbeb84a503fd44c
humanhash: solar-finch-king-dakota
File name:Document pdf...................exe
Download: download sample
Signature SnakeKeylogger
File size:1'143'808 bytes
First seen:2020-12-22 07:24:18 UTC
Last seen:2020-12-22 08:46:22 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'664 x AgentTesla, 19'478 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 24576:czwmVcm/et/MOQMjpK4BibBVFyWS56Uo1Ko67w5o67w:X2cm2tkZodiVXKo62o6
Threatray 9 similar samples on MalwareBazaar
TLSH EB35BE342AEE1219F173AF795AD474969BFFF6336307D45D28A1038A4213E40DEE163A
Reporter abuse_ch
Tags:exe SnakeKeylogger


Avatar
abuse_ch
Malspam distributing SnakeKeylogger:

HELO: WIN-D253A4F02D5
Sending IP: 185.222.58.151
From: Purchase Order<OrderDetails@trackyourorder12.com>
Subject: Purchase Order - Payment Remittance
Attachment: 0lOcArS3GwQClRz 1.z (contains "Document pdf...................exe")

Intelligence


File Origin
# of uploads :
2
# of downloads :
305
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Document pdf...................exe
Verdict:
Malicious activity
Analysis date:
2020-12-22 08:00:39 UTC
Tags:
evasion trojan 404keylogger stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
Launching a process
Creating a process with a hidden window
Result
Gathering data
Result
Threat name:
AgentTesla Snake Keylogger
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large strings
Found malware configuration
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
May check the online IP address of the machine
Sigma detected: Scheduled temp file as task from temp location
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected AgentTesla
Yara detected AntiVM_3
Yara detected Snake Keylogger
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2020-12-22 07:25:09 UTC
AV detection:
14 of 28 (50.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
spyware
Behaviour
Creates scheduled task(s)
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Looks up external IP address via web service
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Unpacked files
SH256 hash:
f5908b0df1dd1a1b0c09d713294ed1328160f4f57e0e49abd17ef96a5b614d64
MD5 hash:
f7570ed77fd1fd0aadbeb84a503fd44c
SHA1 hash:
21f8905d1f854a34008a10ec58b5d3240d6e77b2
SH256 hash:
55abf08a6a6ab7c7848a2bc0410d84befe6dcfa118336e2e4f1ee456a8009efc
MD5 hash:
6ce9761c3c3ae715d40a77b982d31dc9
SHA1 hash:
42a5a02eabe7d80d79408549e7686d4e44524361
SH256 hash:
3829b2f6f4fea243dfe3b8b2d36a879a51f2dcd80c4cf81c917d87048f8fe0e7
MD5 hash:
be4cd6437e22e0902ae47d369f6ee212
SHA1 hash:
52a2d209504ce9d213078e19c60594b2948b4197
SH256 hash:
e1bb98761eafe1e3e9ad1cb3283fbc5acfe52f71a77f763b250de4b4c614604e
MD5 hash:
55ad7c825741486973d3a8fd3830a850
SHA1 hash:
a8a7356fbee815d63c20b0c69cd3d6e5193356af
SH256 hash:
55276b9e2e1487190620409d5810be0ccb5ea27c2be4e528b707595b8d89bc7a
MD5 hash:
a35a008c21d3aea693dd23a3d8d526f2
SHA1 hash:
f8bb2cffecbd1e95275f5e8e81ca51e4cbe33687
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_ConfuserExMod_BedsProtector
Author:ditekSHen
Description:Detects executables packed with ConfuserEx Mod Beds Protector
Rule name:Keylog_bin_mem
Author:James_inthe_box
Description:Contains Keylog
Rule name:MALWARE_Win_Snake
Author:ditekSHen
Description:Detects Snake Keylogger

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

SnakeKeylogger

Executable exe f5908b0df1dd1a1b0c09d713294ed1328160f4f57e0e49abd17ef96a5b614d64

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments