MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 0329eea7ab274894de8d7f91105cdea35e86e45e73c9c4411c5fae7cd564832c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
MassLogger
Vendor detections: 9
| SHA256 hash: | 0329eea7ab274894de8d7f91105cdea35e86e45e73c9c4411c5fae7cd564832c |
|---|---|
| SHA3-384 hash: | aa431839edbf0f136177944d2afa1967771961f1deb680da6b2f9fd55d247b6fc45f18869a24f21aaf3f25fc96520930 |
| SHA1 hash: | 65dbfdd4da931bd749f99b5a3c766baa61012e6c |
| MD5 hash: | a11cb2b444cb1a165e23fc97fe1304cb |
| humanhash: | diet-mirror-high-mobile |
| File name: | Hesap hareketleriniz.exe |
| Download: | download sample |
| Signature | MassLogger |
| File size: | 1'303'552 bytes |
| First seen: | 2020-08-04 13:35:23 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 4bae7147ec04d935db5914fb885560bb (11 x AgentTesla, 3 x MassLogger, 2 x AZORult) |
| ssdeep | 24576:detNafLLOM9QKlNwWIM2vIeqWDvV8MxK1PmZU14Sn:de00Kl6Wt2vIeqM3xiPmZGL |
| Threatray | 1'831 similar samples on MalwareBazaar |
| TLSH | 4C55CF1EB3A08C36F1B2367DBD1B5EA4582EFD012D289A463BE4DD4C4E386513A35397 |
| Reporter | |
| Tags: | exe geo MassLogger TUR |
abuse_ch
Malspam distributing unidentified malware:HELO: mx.diyarbakiroto.com.tr
Sending IP: 176.53.12.184
From: QNB Finansbank <email@email.qnbfinansbank.com>
Reply-To: otikafranklin@gmail.com
Subject: Hesap hareketleriniz
Attachment: Hesap hareketleriniz.rar (contains "Hesap hareketleriniz.exe")
Intelligence
File Origin
# of uploads :
1
# of downloads :
79
Origin country :
n/a
Vendor Threat Intelligence
Detection:
Ispy
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a window
Launching a process
Unauthorized injection to a recently created process
Sending a UDP request
Using the Windows Management Instrumentation requests
Running batch commands
Creating a file
Unauthorized injection to a system process
Enabling autorun by creating a file
Deleting of the original file
Result
Threat name:
MassLogger RAT
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Contains functionality to detect sleep reduction / modifications
Delayed program exit found
Detected unpacking (changes PE section rights)
Detected unpacking (creates a PE file in dynamic memory)
Detected unpacking (overwrites its own PE header)
Drops VBS files to the startup folder
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Queues an APC in another process (thread injection)
Sigma detected: Drops script at startup location
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
Yara detected AntiVM_3
Yara detected MassLogger RAT
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.FormBook
Status:
Malicious
First seen:
2020-08-04 13:37:05 UTC
AV detection:
25 of 29 (86.21%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Label(s):
hawkeyekeylogger
Similar samples:
+ 1'821 additional samples on MalwareBazaar
Result
Malware family:
masslogger
Score:
10/10
Tags:
ransomware upx spyware stealer family:masslogger
Behaviour
Suspicious use of WriteProcessMemory
Suspicious behavior: AddClipboardFormatListener
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of SetThreadContext
Looks up external IP address via web service
Drops startup file
Reads user/profile data of web browsers
UPX packed file
MassLogger
MassLogger log file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.