2.0.RFQ pdf.exe.400000.0.unpack | MAL_Envrial_Jan18_1 | Detects Encrial credential stealer malware | Florian Roth | - 0x1b084:$a2: \Comodo\Dragon\User Data\Default\Login Data
- 0x1a26d:$a3: \Google\Chrome\User Data\Default\Login Data
- 0x1a6b4:$a4: \Orbitum\User Data\Default\Login Data
- 0x1b835:$a5: \Kometa\User Data\Default\Login Data
|
2.0.RFQ pdf.exe.400000.0.unpack | JoeSecurity_SnakeKeylogger | Yara detected Snake Keylogger | Joe Security | |
2.0.RFQ pdf.exe.400000.0.unpack | JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security | |
2.0.RFQ pdf.exe.400000.0.unpack | JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | |
2.0.RFQ pdf.exe.400000.0.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
2.0.RFQ pdf.exe.400000.0.unpack | INDICATOR_SUSPICIOUS_EXE_DotNetProcHook | Detects executables with potential process hoocking | ditekSHen | - 0x146d1:$s1: UnHook
- 0x146d8:$s2: SetHook
- 0x146e0:$s3: CallNextHook
- 0x146ed:$s4: _hook
|
2.0.RFQ pdf.exe.400000.0.unpack | MALWARE_Win_SnakeKeylogger | Detects Snake Keylogger | ditekSHen | - 0x18784:$x1: $%SMTPDV$
- 0x1744a:$x2: $#TheHashHere%&
- 0x1872c:$x3: %FTPDV$
- 0x1742c:$x4: $%TelegramDv$
- 0x14d41:$x5: KeyLoggerEventArgs
- 0x150d7:$x5: KeyLoggerEventArgs
- 0x187b0:$m1: | Snake Keylogger
- 0x18856:$m1: | Snake Keylogger
- 0x189aa:$m1: | Snake Keylogger
- 0x18ad0:$m1: | Snake Keylogger
- 0x18c2a:$m1: | Snake Keylogger
- 0x18750:$m2: Clipboard Logs ID
- 0x18960:$m2: Screenshot Logs ID
- 0x18a74:$m2: keystroke Logs ID
- 0x18c60:$m3: SnakePW
- 0x18938:$m4: \SnakeKeylogger\
|
2.0.RFQ pdf.exe.400000.0.unpack | Windows_Trojan_SnakeKeylogger_af3faa65 | unknown | unknown | - 0x13b48:$a1: get_encryptedPassword
- 0x13e34:$a2: get_encryptedUsername
- 0x13954:$a3: get_timePasswordChanged
- 0x13a4f:$a4: get_passwordField
- 0x13b5e:$a5: set_encryptedPassword
- 0x15174:$a7: get_logins
- 0x150d7:$a10: KeyLoggerEventArgs
- 0x14d41:$a11: KeyLoggerEventArgsEventHandler
|
0.2.RFQ pdf.exe.3af6a18.8.unpack | MAL_Envrial_Jan18_1 | Detects Encrial credential stealer malware | Florian Roth | - 0x19284:$a2: \Comodo\Dragon\User Data\Default\Login Data
- 0x1846d:$a3: \Google\Chrome\User Data\Default\Login Data
- 0x188b4:$a4: \Orbitum\User Data\Default\Login Data
- 0x19a35:$a5: \Kometa\User Data\Default\Login Data
|
0.2.RFQ pdf.exe.3af6a18.8.unpack | JoeSecurity_SnakeKeylogger | Yara detected Snake Keylogger | Joe Security | |
0.2.RFQ pdf.exe.3af6a18.8.unpack | JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security | |
0.2.RFQ pdf.exe.3af6a18.8.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
0.2.RFQ pdf.exe.3af6a18.8.unpack | INDICATOR_SUSPICIOUS_EXE_DotNetProcHook | Detects executables with potential process hoocking | ditekSHen | - 0x128d1:$s1: UnHook
- 0x128d8:$s2: SetHook
- 0x128e0:$s3: CallNextHook
- 0x128ed:$s4: _hook
|
0.2.RFQ pdf.exe.3af6a18.8.unpack | MALWARE_Win_SnakeKeylogger | Detects Snake Keylogger | ditekSHen | - 0x16984:$x1: $%SMTPDV$
- 0x1564a:$x2: $#TheHashHere%&
- 0x1692c:$x3: %FTPDV$
- 0x1562c:$x4: $%TelegramDv$
- 0x12f41:$x5: KeyLoggerEventArgs
- 0x132d7:$x5: KeyLoggerEventArgs
- 0x169b0:$m1: | Snake Keylogger
- 0x16a56:$m1: | Snake Keylogger
- 0x16baa:$m1: | Snake Keylogger
- 0x16cd0:$m1: | Snake Keylogger
- 0x16e2a:$m1: | Snake Keylogger
- 0x16950:$m2: Clipboard Logs ID
- 0x16b60:$m2: Screenshot Logs ID
- 0x16c74:$m2: keystroke Logs ID
- 0x16e60:$m3: SnakePW
- 0x16b38:$m4: \SnakeKeylogger\
|
0.2.RFQ pdf.exe.3af6a18.8.unpack | Windows_Trojan_SnakeKeylogger_af3faa65 | unknown | unknown | - 0x11d48:$a1: get_encryptedPassword
- 0x12034:$a2: get_encryptedUsername
- 0x11b54:$a3: get_timePasswordChanged
- 0x11c4f:$a4: get_passwordField
- 0x11d5e:$a5: set_encryptedPassword
- 0x13374:$a7: get_logins
- 0x132d7:$a10: KeyLoggerEventArgs
- 0x12f41:$a11: KeyLoggerEventArgsEventHandler
|
0.2.RFQ pdf.exe.3b91da0.9.raw.unpack | MAL_Envrial_Jan18_1 | Detects Encrial credential stealer malware | Florian Roth | - 0x946a4:$a2: \Comodo\Dragon\User Data\Default\Login Data
- 0xb3cc4:$a2: \Comodo\Dragon\User Data\Default\Login Data
- 0x9388d:$a3: \Google\Chrome\User Data\Default\Login Data
- 0xb2ead:$a3: \Google\Chrome\User Data\Default\Login Data
- 0x93cd4:$a4: \Orbitum\User Data\Default\Login Data
- 0xb32f4:$a4: \Orbitum\User Data\Default\Login Data
- 0x94e55:$a5: \Kometa\User Data\Default\Login Data
- 0xb4475:$a5: \Kometa\User Data\Default\Login Data
|
0.2.RFQ pdf.exe.3b91da0.9.raw.unpack | JoeSecurity_SnakeKeylogger | Yara detected Snake Keylogger | Joe Security | |
0.2.RFQ pdf.exe.3b91da0.9.raw.unpack | JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security | |
0.2.RFQ pdf.exe.3b91da0.9.raw.unpack | JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | |
0.2.RFQ pdf.exe.3b91da0.9.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
0.2.RFQ pdf.exe.3b91da0.9.raw.unpack | INDICATOR_SUSPICIOUS_EXE_DotNetProcHook | Detects executables with potential process hoocking | ditekSHen | - 0x8dcf1:$s1: UnHook
- 0xad311:$s1: UnHook
- 0x8dcf8:$s2: SetHook
- 0xad318:$s2: SetHook
- 0x8dd00:$s3: CallNextHook
- 0xad320:$s3: CallNextHook
- 0x8dd0d:$s4: _hook
- 0xad32d:$s4: _hook
|
0.2.RFQ pdf.exe.3b91da0.9.raw.unpack | MALWARE_Win_SnakeKeylogger | Detects Snake Keylogger | ditekSHen | - 0x91da4:$x1: $%SMTPDV$
- 0xb13c4:$x1: $%SMTPDV$
- 0x90a6a:$x2: $#TheHashHere%&
- 0xb008a:$x2: $#TheHashHere%&
- 0x91d4c:$x3: %FTPDV$
- 0xb136c:$x3: %FTPDV$
- 0x90a4c:$x4: $%TelegramDv$
- 0xb006c:$x4: $%TelegramDv$
- 0x8e361:$x5: KeyLoggerEventArgs
- 0x8e6f7:$x5: KeyLoggerEventArgs
- 0xad981:$x5: KeyLoggerEventArgs
- 0xadd17:$x5: KeyLoggerEventArgs
- 0x91dd0:$m1: | Snake Keylogger
- 0x91e76:$m1: | Snake Keylogger
- 0x91fca:$m1: | Snake Keylogger
- 0x920f0:$m1: | Snake Keylogger
- 0x9224a:$m1: | Snake Keylogger
- 0xb13f0:$m1: | Snake Keylogger
- 0xb1496:$m1: | Snake Keylogger
- 0xb15ea:$m1: | Snake Keylogger
- 0xb1710:$m1: | Snake Keylogger
|
0.2.RFQ pdf.exe.3b91da0.9.raw.unpack | Windows_Trojan_SnakeKeylogger_af3faa65 | unknown | unknown | - 0x8d168:$a1: get_encryptedPassword
- 0xac788:$a1: get_encryptedPassword
- 0x8d454:$a2: get_encryptedUsername
- 0xaca74:$a2: get_encryptedUsername
- 0x8cf74:$a3: get_timePasswordChanged
- 0xac594:$a3: get_timePasswordChanged
- 0x8d06f:$a4: get_passwordField
- 0xac68f:$a4: get_passwordField
- 0x8d17e:$a5: set_encryptedPassword
- 0xac79e:$a5: set_encryptedPassword
- 0x8e794:$a7: get_logins
- 0xaddb4:$a7: get_logins
- 0x8e6f7:$a10: KeyLoggerEventArgs
- 0xadd17:$a10: KeyLoggerEventArgs
- 0x8e361:$a11: KeyLoggerEventArgsEventHandler
- 0xad981:$a11: KeyLoggerEventArgsEventHandler
|
0.2.RFQ pdf.exe.3af6a18.8.raw.unpack | JoeSecurity_SnakeKeylogger | Yara detected Snake Keylogger | Joe Security | |
0.2.RFQ pdf.exe.3af6a18.8.raw.unpack | JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security | |
0.2.RFQ pdf.exe.3af6a18.8.raw.unpack | JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | |
0.2.RFQ pdf.exe.3af6a18.8.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
0.2.RFQ pdf.exe.3af6a18.8.raw.unpack | INDICATOR_SUSPICIOUS_EXE_DotNetProcHook | Detects executables with potential process hoocking | ditekSHen | - 0x146d1:$s1: UnHook
- 0x129079:$s1: UnHook
- 0x148699:$s1: UnHook
- 0x146d8:$s2: SetHook
- 0x129080:$s2: SetHook
- 0x1486a0:$s2: SetHook
- 0x146e0:$s3: CallNextHook
- 0x129088:$s3: CallNextHook
- 0x1486a8:$s3: CallNextHook
- 0x146ed:$s4: _hook
- 0x129095:$s4: _hook
- 0x1486b5:$s4: _hook
|
0.2.RFQ pdf.exe.3af6a18.8.raw.unpack | MALWARE_Win_SnakeKeylogger | Detects Snake Keylogger | ditekSHen | - 0x18784:$x1: $%SMTPDV$
- 0x12d12c:$x1: $%SMTPDV$
- 0x14c74c:$x1: $%SMTPDV$
- 0x1744a:$x2: $#TheHashHere%&
- 0x12bdf2:$x2: $#TheHashHere%&
- 0x14b412:$x2: $#TheHashHere%&
- 0x1872c:$x3: %FTPDV$
- 0x12d0d4:$x3: %FTPDV$
- 0x14c6f4:$x3: %FTPDV$
- 0x1742c:$x4: $%TelegramDv$
- 0x12bdd4:$x4: $%TelegramDv$
- 0x14b3f4:$x4: $%TelegramDv$
- 0x14d41:$x5: KeyLoggerEventArgs
- 0x150d7:$x5: KeyLoggerEventArgs
- 0x1296e9:$x5: KeyLoggerEventArgs
- 0x129a7f:$x5: KeyLoggerEventArgs
- 0x148d09:$x5: KeyLoggerEventArgs
- 0x14909f:$x5: KeyLoggerEventArgs
- 0x187b0:$m1: | Snake Keylogger
- 0x18856:$m1: | Snake Keylogger
- 0x189aa:$m1: | Snake Keylogger
|
0.2.RFQ pdf.exe.3af6a18.8.raw.unpack | Windows_Trojan_SnakeKeylogger_af3faa65 | unknown | unknown | - 0x13b48:$a1: get_encryptedPassword
- 0x1284f0:$a1: get_encryptedPassword
- 0x147b10:$a1: get_encryptedPassword
- 0x13e34:$a2: get_encryptedUsername
- 0x1287dc:$a2: get_encryptedUsername
- 0x147dfc:$a2: get_encryptedUsername
- 0x13954:$a3: get_timePasswordChanged
- 0x1282fc:$a3: get_timePasswordChanged
- 0x14791c:$a3: get_timePasswordChanged
- 0x13a4f:$a4: get_passwordField
- 0x1283f7:$a4: get_passwordField
- 0x147a17:$a4: get_passwordField
- 0x13b5e:$a5: set_encryptedPassword
- 0x128506:$a5: set_encryptedPassword
- 0x147b26:$a5: set_encryptedPassword
- 0x15174:$a7: get_logins
- 0x129b1c:$a7: get_logins
- 0x14913c:$a7: get_logins
- 0x150d7:$a10: KeyLoggerEventArgs
- 0x129a7f:$a10: KeyLoggerEventArgs
- 0x14909f:$a10: KeyLoggerEventArgs
|
0.2.RFQ pdf.exe.3ad53f8.10.raw.unpack | JoeSecurity_SnakeKeylogger | Yara detected Snake Keylogger | Joe Security | |
0.2.RFQ pdf.exe.3ad53f8.10.raw.unpack | JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security | |
0.2.RFQ pdf.exe.3ad53f8.10.raw.unpack | JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | |
0.2.RFQ pdf.exe.3ad53f8.10.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
0.2.RFQ pdf.exe.3ad53f8.10.raw.unpack | INDICATOR_SUSPICIOUS_EXE_DotNetProcHook | Detects executables with potential process hoocking | ditekSHen | - 0x35cf1:$s1: UnHook
- 0x14a699:$s1: UnHook
- 0x169cb9:$s1: UnHook
- 0x35cf8:$s2: SetHook
- 0x14a6a0:$s2: SetHook
- 0x169cc0:$s2: SetHook
- 0x35d00:$s3: CallNextHook
- 0x14a6a8:$s3: CallNextHook
- 0x169cc8:$s3: CallNextHook
- 0x35d0d:$s4: _hook
- 0x14a6b5:$s4: _hook
- 0x169cd5:$s4: _hook
|
0.2.RFQ pdf.exe.3ad53f8.10.raw.unpack | MALWARE_Win_SnakeKeylogger | Detects Snake Keylogger | ditekSHen | - 0x39da4:$x1: $%SMTPDV$
- 0x14e74c:$x1: $%SMTPDV$
- 0x16dd6c:$x1: $%SMTPDV$
- 0x38a6a:$x2: $#TheHashHere%&
- 0x14d412:$x2: $#TheHashHere%&
- 0x16ca32:$x2: $#TheHashHere%&
- 0x39d4c:$x3: %FTPDV$
- 0x14e6f4:$x3: %FTPDV$
- 0x16dd14:$x3: %FTPDV$
- 0x38a4c:$x4: $%TelegramDv$
- 0x14d3f4:$x4: $%TelegramDv$
- 0x16ca14:$x4: $%TelegramDv$
- 0x36361:$x5: KeyLoggerEventArgs
- 0x366f7:$x5: KeyLoggerEventArgs
- 0x14ad09:$x5: KeyLoggerEventArgs
- 0x14b09f:$x5: KeyLoggerEventArgs
- 0x16a329:$x5: KeyLoggerEventArgs
- 0x16a6bf:$x5: KeyLoggerEventArgs
- 0x39dd0:$m1: | Snake Keylogger
- 0x39e76:$m1: | Snake Keylogger
- 0x39fca:$m1: | Snake Keylogger
|
0.2.RFQ pdf.exe.3ad53f8.10.raw.unpack | Windows_Trojan_SnakeKeylogger_af3faa65 | unknown | unknown | - 0x35168:$a1: get_encryptedPassword
- 0x149b10:$a1: get_encryptedPassword
- 0x169130:$a1: get_encryptedPassword
- 0x35454:$a2: get_encryptedUsername
- 0x149dfc:$a2: get_encryptedUsername
- 0x16941c:$a2: get_encryptedUsername
- 0x34f74:$a3: get_timePasswordChanged
- 0x14991c:$a3: get_timePasswordChanged
- 0x168f3c:$a3: get_timePasswordChanged
- 0x3506f:$a4: get_passwordField
- 0x149a17:$a4: get_passwordField
- 0x169037:$a4: get_passwordField
- 0x3517e:$a5: set_encryptedPassword
- 0x149b26:$a5: set_encryptedPassword
- 0x169146:$a5: set_encryptedPassword
- 0x36794:$a7: get_logins
- 0x14b13c:$a7: get_logins
- 0x16a75c:$a7: get_logins
- 0x366f7:$a10: KeyLoggerEventArgs
- 0x14b09f:$a10: KeyLoggerEventArgs
- 0x16a6bf:$a10: KeyLoggerEventArgs
|
Click to see the 32 entries |