MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 0c55098abd53007222f82e28f2a4babde406ce297215002ade5c819647bb92c9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
MassLogger
Vendor detections: 9
| SHA256 hash: | 0c55098abd53007222f82e28f2a4babde406ce297215002ade5c819647bb92c9 |
|---|---|
| SHA3-384 hash: | 7ce35e152e1f073c85a1df7d86b2ada169dcf32722fec2743392e6c3abd9b4d961ec7115cd2eaaed595d4126e9e4796d |
| SHA1 hash: | e0f8d19ff0c31fd5f9864e3d243d33d7e988efbf |
| MD5 hash: | daba68018a971a6810156208ec1a2ee3 |
| humanhash: | fish-mississippi-fix-delta |
| File name: | red split PO.exe |
| Download: | download sample |
| Signature | MassLogger |
| File size: | 959'488 bytes |
| First seen: | 2020-11-24 15:25:03 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'462 x Formbook, 12'204 x SnakeKeylogger) |
| ssdeep | 12288:vYByki2aZkda1aHU+yfFAACGoh+ZuXV2d1JkGTvtSBDAZrRTx+xkwhrIsQTt8LFd:IuZ6a7Ch+ZgcnkGiDAdolls8 |
| Threatray | 564 similar samples on MalwareBazaar |
| TLSH | 3715023257E26E92E77A2F7091B2D6740FAA7C679A30E71C2EC80DE731A17448914F31 |
| Reporter | |
| Tags: | exe MassLogger |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Result
Signature
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | Keylog_bin_mem |
|---|---|
| Author: | James_inthe_box |
| Description: | Contains Keylog |
| Rule name: | masslogger_gcch |
|---|---|
| Author: | govcert_ch |
| Rule name: | Quasar_RAT_1 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects Quasar RAT |
| Reference: | https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf |
| Rule name: | win_masslogger_w0 |
|---|---|
| Author: | govcert_ch |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.