MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b4e5394cabb090592d987c1ee9bbee93b2f4aeb907cbbb70b62554f1bfc773eb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



MassLogger


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: b4e5394cabb090592d987c1ee9bbee93b2f4aeb907cbbb70b62554f1bfc773eb
SHA3-384 hash: b0be37a669b5e78ebd82603e16d2e1873182f30ce9404d041b9ed643591a867c2f964d86d6e898824c33aa98cc6d6e20
SHA1 hash: fb72e8a7b1a5470312ab6f618677758e90f0049f
MD5 hash: 97910a5d5c39a191f4fb1cc62a1f543d
humanhash: winner-wisconsin-green-summer
File name:ADKA INQ.exe
Download: download sample
Signature MassLogger
File size:2'452'992 bytes
First seen:2020-05-20 12:11:57 UTC
Last seen:2020-05-20 13:17:28 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'462 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 24576:Zcs9Ea6ZbSVwA+PK6QmNkS/KtRo3h61kU1iUhp3DAoPCPcSoVZAbO5:ZxG2eK6VCgOoR6vgYNjqPcpZF5
Threatray 698 similar samples on MalwareBazaar
TLSH 84B58D263982D009C52C4172017AAAC576F66B423657CB2EF6AFA34B5F02B3F7B115CD
Reporter abuse_ch
Tags:exe MassLogger


Avatar
abuse_ch
Malspam distributing MassLogger:

HELO: eepsjc1-02.nexcess.net
Sending IP: 104.207.238.163
From: Albabtain <abc@abc.sa.com>
Reply-To: jonah@briistol.com
Subject: 1nquiry from ABC(2005032)
Attachment: ADKA INQ.CAB (contains "ADKA INQ.exe")

MassLogger SMTP exfil server:
smtp.yandex.com:587

Intelligence


File Origin
# of uploads :
2
# of downloads :
93
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
ByteCode-MSIL.Trojan.Hesv
Status:
Malicious
First seen:
2020-05-20 10:03:05 UTC
File Type:
PE (.Net Exe)
Extracted files:
5
AV detection:
22 of 30 (73.33%)
Threat level:
  2/5
Result
Malware family:
masslogger
Score:
  10/10
Tags:
family:masslogger agilenet ransomware spyware stealer
Behaviour
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Looks up external IP address via web service
Obfuscated with Agile.Net obfuscator
Reads user/profile data of web browsers
MassLogger
MassLogger log file
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

MassLogger

Executable exe b4e5394cabb090592d987c1ee9bbee93b2f4aeb907cbbb70b62554f1bfc773eb

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments