MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cc976126805d59f17a49219bf29d4de6707a8972ef94e04f1f9d0e26746854e7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



MassLogger


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: cc976126805d59f17a49219bf29d4de6707a8972ef94e04f1f9d0e26746854e7
SHA3-384 hash: bbb451ff38151b284e1e394914f3a231161eebf28aaab93126c8212cc49ebdfe403efeff7691306450ab510642775f3e
SHA1 hash: 5ae31de995c9057cd455840a0af9c5fadde86063
MD5 hash: c94c6c92d872dcccb6b7674ae5edfa4f
humanhash: jersey-fourteen-charlie-angel
File name:IDBI BANK JUNE 2020 Statement.exe
Download: download sample
Signature MassLogger
File size:2'205'696 bytes
First seen:2020-06-08 08:39:59 UTC
Last seen:2020-06-08 10:22:18 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'462 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 24576:Vt6Nrn3d9F1iPMTVTG+hMJeWbOU6gkgc5BDb5bvOPjj61yPCtJ7O:qj9FmCTGFJeWbTXkZJJvOP3qoWJ7
Threatray 795 similar samples on MalwareBazaar
TLSH 5FA5AE26B896580CC82D467540BDA9C7B63BAB463E428B1F7A9FA30C5F0375F7B1502D
Reporter abuse_ch
Tags:exe MassLogger


Avatar
abuse_ch
Malspam distributing MassLogger:

HELO: cloudhost-67388.au-south-1.nxcli.net
Sending IP: 103.224.90.42
From: IDBI Bank <neft@idbi.com>
Subject: IDBI BANK JUNE 2020 Account Statement
Attachment: IDBI BANK JUNE 2020 Statement.CAB (contains "IDBI BANK JUNE 2020 Statement.exe")

Intelligence


File Origin
# of uploads :
2
# of downloads :
71
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2020-06-08 07:37:00 UTC
AV detection:
25 of 31 (80.65%)
Threat level:
  5/5
Result
Malware family:
masslogger
Score:
  10/10
Tags:
family:masslogger agilenet ransomware spyware stealer
Behaviour
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Looks up external IP address via web service
Checks computer location settings
Loads dropped DLL
Obfuscated with Agile.Net obfuscator
Reads user/profile data of web browsers
Executes dropped EXE
MassLogger
MassLogger log file
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

MassLogger

Executable exe cc976126805d59f17a49219bf29d4de6707a8972ef94e04f1f9d0e26746854e7

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments