0.2.file.exe.416fa10.6.unpack | MAL_Envrial_Jan18_1 | Detects Encrial credential stealer malware | Florian Roth | - 0x198d3:$a2: \Comodo\Dragon\User Data\Default\Login Data
- 0x18b05:$a3: \Google\Chrome\User Data\Default\Login Data
- 0x18f38:$a4: \Orbitum\User Data\Default\Login Data
- 0x1a05f:$a5: \Kometa\User Data\Default\Login Data
|
0.2.file.exe.416fa10.6.unpack | JoeSecurity_SnakeKeylogger | Yara detected Snake Keylogger | Joe Security | |
0.2.file.exe.416fa10.6.unpack | JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security | |
0.2.file.exe.416fa10.6.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
0.2.file.exe.416fa10.6.unpack | INDICATOR_SUSPICIOUS_EXE_DotNetProcHook | Detects executables with potential process hoocking | ditekSHen | - 0x12d07:$s1: UnHook
- 0x12d0e:$s2: SetHook
- 0x12d16:$s3: CallNextHook
- 0x12d23:$s4: _hook
|
0.2.file.exe.416fa10.6.unpack | MALWARE_Win_SnakeKeylogger | Detects Snake Keylogger | ditekSHen | - 0x15acc:$x1: $%SMTPDV$
- 0x15ae2:$x2: $#TheHashHere%&
- 0x16fe3:$x3: %FTPDV$
- 0x170a7:$x4: $%TelegramDv$
- 0x13365:$x5: KeyLoggerEventArgs
- 0x136fb:$x5: KeyLoggerEventArgs
- 0x17007:$m2: Clipboard Logs ID
- 0x1720d:$m2: Screenshot Logs ID
- 0x1731d:$m2: keystroke Logs ID
- 0x17501:$m3: SnakePW
- 0x171e5:$m4: \SnakeKeylogger\
|
0.2.file.exe.416fa10.6.unpack | Windows_Trojan_SnakeKeylogger_af3faa65 | unknown | unknown | - 0x12190:$a1: get_encryptedPassword
- 0x1247c:$a2: get_encryptedUsername
- 0x11f9c:$a3: get_timePasswordChanged
- 0x12097:$a4: get_passwordField
- 0x121a6:$a5: set_encryptedPassword
- 0x13798:$a7: get_logins
- 0x136fb:$a10: KeyLoggerEventArgs
- 0x13365:$a11: KeyLoggerEventArgsEventHandler
|
0.2.file.exe.44a67c8.10.unpack | MAL_Envrial_Jan18_1 | Detects Encrial credential stealer malware | Florian Roth | - 0x198d3:$a2: \Comodo\Dragon\User Data\Default\Login Data
- 0x18b05:$a3: \Google\Chrome\User Data\Default\Login Data
- 0x18f38:$a4: \Orbitum\User Data\Default\Login Data
- 0x1a05f:$a5: \Kometa\User Data\Default\Login Data
|
0.2.file.exe.44a67c8.10.unpack | JoeSecurity_SnakeKeylogger | Yara detected Snake Keylogger | Joe Security | |
0.2.file.exe.44a67c8.10.unpack | JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security | |
0.2.file.exe.44a67c8.10.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
0.2.file.exe.44a67c8.10.unpack | INDICATOR_SUSPICIOUS_EXE_DotNetProcHook | Detects executables with potential process hoocking | ditekSHen | - 0x12d07:$s1: UnHook
- 0x12d0e:$s2: SetHook
- 0x12d16:$s3: CallNextHook
- 0x12d23:$s4: _hook
|
0.2.file.exe.44a67c8.10.unpack | MALWARE_Win_SnakeKeylogger | Detects Snake Keylogger | ditekSHen | - 0x15acc:$x1: $%SMTPDV$
- 0x15ae2:$x2: $#TheHashHere%&
- 0x16fe3:$x3: %FTPDV$
- 0x170a7:$x4: $%TelegramDv$
- 0x13365:$x5: KeyLoggerEventArgs
- 0x136fb:$x5: KeyLoggerEventArgs
- 0x17007:$m2: Clipboard Logs ID
- 0x1720d:$m2: Screenshot Logs ID
- 0x1731d:$m2: keystroke Logs ID
- 0x17501:$m3: SnakePW
- 0x171e5:$m4: \SnakeKeylogger\
|
0.2.file.exe.44a67c8.10.unpack | Windows_Trojan_SnakeKeylogger_af3faa65 | unknown | unknown | - 0x12190:$a1: get_encryptedPassword
- 0x1247c:$a2: get_encryptedUsername
- 0x11f9c:$a3: get_timePasswordChanged
- 0x12097:$a4: get_passwordField
- 0x121a6:$a5: set_encryptedPassword
- 0x13798:$a7: get_logins
- 0x136fb:$a10: KeyLoggerEventArgs
- 0x13365:$a11: KeyLoggerEventArgsEventHandler
|
0.2.file.exe.44a67c8.10.raw.unpack | MAL_Envrial_Jan18_1 | Detects Encrial credential stealer malware | Florian Roth | - 0x1b6d3:$a2: \Comodo\Dragon\User Data\Default\Login Data
- 0x1a905:$a3: \Google\Chrome\User Data\Default\Login Data
- 0x1ad38:$a4: \Orbitum\User Data\Default\Login Data
- 0x1be5f:$a5: \Kometa\User Data\Default\Login Data
|
0.2.file.exe.44a67c8.10.raw.unpack | JoeSecurity_SnakeKeylogger | Yara detected Snake Keylogger | Joe Security | |
0.2.file.exe.44a67c8.10.raw.unpack | JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security | |
0.2.file.exe.44a67c8.10.raw.unpack | JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | |
0.2.file.exe.44a67c8.10.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
0.2.file.exe.44a67c8.10.raw.unpack | INDICATOR_SUSPICIOUS_EXE_DotNetProcHook | Detects executables with potential process hoocking | ditekSHen | - 0x14b07:$s1: UnHook
- 0x14b0e:$s2: SetHook
- 0x14b16:$s3: CallNextHook
- 0x14b23:$s4: _hook
|
0.2.file.exe.44a67c8.10.raw.unpack | MALWARE_Win_SnakeKeylogger | Detects Snake Keylogger | ditekSHen | - 0x178cc:$x1: $%SMTPDV$
- 0x178e2:$x2: $#TheHashHere%&
- 0x18de3:$x3: %FTPDV$
- 0x18ea7:$x4: $%TelegramDv$
- 0x15165:$x5: KeyLoggerEventArgs
- 0x154fb:$x5: KeyLoggerEventArgs
- 0x18e07:$m2: Clipboard Logs ID
- 0x1900d:$m2: Screenshot Logs ID
- 0x1911d:$m2: keystroke Logs ID
- 0x19301:$m3: SnakePW
- 0x18fe5:$m4: \SnakeKeylogger\
|
0.2.file.exe.44a67c8.10.raw.unpack | Windows_Trojan_SnakeKeylogger_af3faa65 | unknown | unknown | - 0x13f90:$a1: get_encryptedPassword
- 0x1427c:$a2: get_encryptedUsername
- 0x13d9c:$a3: get_timePasswordChanged
- 0x13e97:$a4: get_passwordField
- 0x13fa6:$a5: set_encryptedPassword
- 0x15598:$a7: get_logins
- 0x154fb:$a10: KeyLoggerEventArgs
- 0x15165:$a11: KeyLoggerEventArgsEventHandler
|
3.0.file.exe.400000.0.unpack | MAL_Envrial_Jan18_1 | Detects Encrial credential stealer malware | Florian Roth | - 0x1b6d3:$a2: \Comodo\Dragon\User Data\Default\Login Data
- 0x1a905:$a3: \Google\Chrome\User Data\Default\Login Data
- 0x1ad38:$a4: \Orbitum\User Data\Default\Login Data
- 0x1be5f:$a5: \Kometa\User Data\Default\Login Data
|
3.0.file.exe.400000.0.unpack | JoeSecurity_SnakeKeylogger | Yara detected Snake Keylogger | Joe Security | |
3.0.file.exe.400000.0.unpack | JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security | |
3.0.file.exe.400000.0.unpack | JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | |
3.0.file.exe.400000.0.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
3.0.file.exe.400000.0.unpack | INDICATOR_SUSPICIOUS_EXE_DotNetProcHook | Detects executables with potential process hoocking | ditekSHen | - 0x14b07:$s1: UnHook
- 0x14b0e:$s2: SetHook
- 0x14b16:$s3: CallNextHook
- 0x14b23:$s4: _hook
|
3.0.file.exe.400000.0.unpack | MALWARE_Win_SnakeKeylogger | Detects Snake Keylogger | ditekSHen | - 0x178cc:$x1: $%SMTPDV$
- 0x178e2:$x2: $#TheHashHere%&
- 0x18de3:$x3: %FTPDV$
- 0x18ea7:$x4: $%TelegramDv$
- 0x15165:$x5: KeyLoggerEventArgs
- 0x154fb:$x5: KeyLoggerEventArgs
- 0x18e07:$m2: Clipboard Logs ID
- 0x1900d:$m2: Screenshot Logs ID
- 0x1911d:$m2: keystroke Logs ID
- 0x19301:$m3: SnakePW
- 0x18fe5:$m4: \SnakeKeylogger\
|
3.0.file.exe.400000.0.unpack | Windows_Trojan_SnakeKeylogger_af3faa65 | unknown | unknown | - 0x13f90:$a1: get_encryptedPassword
- 0x1427c:$a2: get_encryptedUsername
- 0x13d9c:$a3: get_timePasswordChanged
- 0x13e97:$a4: get_passwordField
- 0x13fa6:$a5: set_encryptedPassword
- 0x15598:$a7: get_logins
- 0x154fb:$a10: KeyLoggerEventArgs
- 0x15165:$a11: KeyLoggerEventArgsEventHandler
|
0.2.file.exe.416fa10.6.raw.unpack | MAL_Envrial_Jan18_1 | Detects Encrial credential stealer malware | Florian Roth | - 0x1b6d3:$a2: \Comodo\Dragon\User Data\Default\Login Data
- 0x1a905:$a3: \Google\Chrome\User Data\Default\Login Data
- 0x1ad38:$a4: \Orbitum\User Data\Default\Login Data
- 0x1be5f:$a5: \Kometa\User Data\Default\Login Data
|
0.2.file.exe.416fa10.6.raw.unpack | JoeSecurity_SnakeKeylogger | Yara detected Snake Keylogger | Joe Security | |
0.2.file.exe.416fa10.6.raw.unpack | JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security | |
0.2.file.exe.416fa10.6.raw.unpack | JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | |
0.2.file.exe.416fa10.6.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
0.2.file.exe.416fa10.6.raw.unpack | INDICATOR_SUSPICIOUS_EXE_DotNetProcHook | Detects executables with potential process hoocking | ditekSHen | - 0x14b07:$s1: UnHook
- 0x14b0e:$s2: SetHook
- 0x14b16:$s3: CallNextHook
- 0x14b23:$s4: _hook
|
0.2.file.exe.416fa10.6.raw.unpack | MALWARE_Win_SnakeKeylogger | Detects Snake Keylogger | ditekSHen | - 0x178cc:$x1: $%SMTPDV$
- 0x178e2:$x2: $#TheHashHere%&
- 0x18de3:$x3: %FTPDV$
- 0x18ea7:$x4: $%TelegramDv$
- 0x15165:$x5: KeyLoggerEventArgs
- 0x154fb:$x5: KeyLoggerEventArgs
- 0x18e07:$m2: Clipboard Logs ID
- 0x1900d:$m2: Screenshot Logs ID
- 0x1911d:$m2: keystroke Logs ID
- 0x19301:$m3: SnakePW
- 0x18fe5:$m4: \SnakeKeylogger\
|
0.2.file.exe.416fa10.6.raw.unpack | Windows_Trojan_SnakeKeylogger_af3faa65 | unknown | unknown | - 0x13f90:$a1: get_encryptedPassword
- 0x1427c:$a2: get_encryptedUsername
- 0x13d9c:$a3: get_timePasswordChanged
- 0x13e97:$a4: get_passwordField
- 0x13fa6:$a5: set_encryptedPassword
- 0x15598:$a7: get_logins
- 0x154fb:$a10: KeyLoggerEventArgs
- 0x15165:$a11: KeyLoggerEventArgsEventHandler
|
Click to see the 33 entries |