MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c43664e2b2ec5c1f4d836f46e2e13452a4d717b8cfd39bd3deceba6bac70d45f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



MassLogger


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: c43664e2b2ec5c1f4d836f46e2e13452a4d717b8cfd39bd3deceba6bac70d45f
SHA3-384 hash: 8da70998e677e0f96a14731b66550aee9ac8fe6674e8da306566ae648780ae575f4e081b6999e314fe47b4bb9bedd3d6
SHA1 hash: 8edf223590cf6f7bc4181b9abe68bbf364da0f5c
MD5 hash: 8dd50f27b2819e6f9a9c591a98ba48cd
humanhash: jersey-mango-mexico-music
File name:PO# 100385304 - NEW ORDER.exe
Download: download sample
Signature MassLogger
File size:1'144'832 bytes
First seen:2020-06-04 06:25:46 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'462 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 24576:IblMfjZYb/Z60YaLLmsnaN6JJk6/0wpCe94RKyE:IblMfjZYb/00ON6H//9oE
Threatray 1'319 similar samples on MalwareBazaar
TLSH 2535BE9D721072EFC85BD472DAA82C68BAA479BB471F4203902715EDDE4D897CF241F2
Reporter abuse_ch
Tags:exe MassLogger


Avatar
abuse_ch
Malspam distributing MassLogger:

HELO: af108.secure.ne.jp
Sending IP: 150.60.155.254
From: Mohamed Ziada <yeliz@cagsmm.com>
Reply-To: marketing@bharathimro.com
Subject: RE: Quotation - 60081-PO-100385304
Attachment: PO 100385304 - NEW ORDER.IMG (contains "PO# 100385304 - NEW ORDER.exe")

MassLogger C2:
http://ceccatospinerets.com/themes/default-bootstrap/img/icon/office/upload.php

Intelligence


File Origin
# of uploads :
1
# of downloads :
69
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
ByteCode-MSIL.Trojan.Kryptik
Status:
Malicious
First seen:
2020-06-04 06:37:54 UTC
AV detection:
25 of 48 (52.08%)
Threat level:
  2/5
Result
Malware family:
masslogger
Score:
  10/10
Tags:
family:masslogger ransomware rezer0 spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Looks up external IP address via web service
Checks computer location settings
Deletes itself
Reads user/profile data of web browsers
rezer0
MassLogger
MassLogger Main Payload
MassLogger log file
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

MassLogger

Executable exe c43664e2b2ec5c1f4d836f46e2e13452a4d717b8cfd39bd3deceba6bac70d45f

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments