MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 0b5155ade6b80a0f9988739163cdf89fdcd12868bab52cca60c7009cae8546af. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
MassLogger
Vendor detections: 13
| SHA256 hash: | 0b5155ade6b80a0f9988739163cdf89fdcd12868bab52cca60c7009cae8546af |
|---|---|
| SHA3-384 hash: | 59fbee8306b91f002f53ba2ae39d17cef9e2a68fe4140ab37ecfb6d100b9e0a22b9fc3e4a0d16562f2dc95ef2f211f64 |
| SHA1 hash: | 0ea10e720abd19855261a569e7ac72a89c4c7418 |
| MD5 hash: | 5b212e18e216f7b6c4d2477c1b5b40a4 |
| humanhash: | wolfram-edward-one-wolfram |
| File name: | 0b5155ade6b80a0f9988739163cdf89fdcd12868bab52cca60c7009cae8546af |
| Download: | download sample |
| Signature | MassLogger |
| File size: | 600'064 bytes |
| First seen: | 2025-07-07 15:04:58 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'653 x AgentTesla, 19'464 x Formbook, 12'205 x SnakeKeylogger) |
| ssdeep | 12288:TgrKHnbY85drJvjEqOIuEmx6Sk+RbiPO88OU7lSSE0A:hHnbXd5XOIuEC6p+4ESSE0A |
| Threatray | 1'351 similar samples on MalwareBazaar |
| TLSH | T15ED4F11822AA9B12C5FF17F90601D0B557B97DCE6411F71A8FCA2CEB7D727810A06B23 |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10522/11/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4504/4/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| Magika | pebin |
| dhash icon | 0c521272c9c4d42b (3 x MassLogger) |
| Reporter | |
| Tags: | exe MassLogger |
Intelligence
File Origin
HUVendor Threat Intelligence
Result
Behaviour
Result
Behaviour
Unpacked files
712a2a2da336e127eea276d37b664f1d82a0c5a94498a051021dafbc8d9bc591
2e5d68fc3cd969cc3fb393afab405b214dd9b0fd7ae40eb4f49142397a00896e
36982cd1c8dc130db45859545ee291128551060bf306217d6db4ae2894145291
e309f8f28059b461a715d458825bc7e00b9e5606eea7337525e9a074dc9effe8
c580a68de9979980650d0ac1aea463cd970c1ec8604e6f419e9c057efbbfdf61
d4b8c9f149cc269c8aca799dd247ee525d33f9d013750f817b4f858691ea5b99
726071ea9188c81b141153a3dc8c2e356f3f789bb1d2c4672091cf3562158d3f
bae6e5e9cb4fe232463c52348ba38ccb1cda92f61414bb27b9edd8743197b927
723dd16fe999e4370309cd38ba3e0de8fa6bff08efd74ad952e5e4c2930c0298
e02df0d57d8056573650acbf45ee9fac3670c25e93740aabdeef21d5510804fb
0d0cbcb571b964e5a596706a55bdbeff01ab4f03c137d2ba04647f8f48ac6dda
04a80cbfdbc1428ea6a1b6377bdd9d164163abf0ac1460e59db8862cdc322382
11da44857eca257bfbebcbd1558987a27ff67fffe12ea8ba2a8ba472abf9e2c0
1dbe7dec1672ec3ba1376b5539d7a8fc6718769849cf6ebddeb2dc9cca4074e5
d20f814c949d8aaefbb38fd7fc5a3d51358e209c88bb40ed611ab34802e3fd9b
0b5155ade6b80a0f9988739163cdf89fdcd12868bab52cca60c7009cae8546af
7e545a76c16dee6d24d3e86c6667c07bcd0f76064f232463b58fd4ec6d930090
71061c247762961b52c05043f9aad7acd24d6be55da97b79136685dc8d71fbcc
35bef5e9ce90087beef7cedaced82461cce0fd2571cb2d4d174a582939d9fde4
0b5155ade6b80a0f9988739163cdf89fdcd12868bab52cca60c7009cae8546af
17e43b76f4a98cd9bf4f0e1d7c23730eaf0e86c228c4f1ddb0961b738be166d9
b4a46f9be7587e5ca51f2a4c20e8fd08f39c2d0e36a9de245a11f90ef11fc08c
be6cfa96f2af2d275323fc9722c8bef9d4b0abd5716a7d344d6dc6ece60a72c5
cabe2979b93dece3c78479d593c5eaf90613e6fdeb33172b651e52f93b521caa
ccfb1cfc174940c9529f5acb8a19b66ffc570311fae21d4eae270434dfbe2513
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | Sus_Obf_Enc_Spoof_Hide_PE |
|---|---|
| Author: | XiAnzheng |
| Description: | Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP) |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.