MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 150f883f1a99dea83e3391920107220fd9794bdaacfb7dc482b44d00e7603023. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



PandaLogger


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 150f883f1a99dea83e3391920107220fd9794bdaacfb7dc482b44d00e7603023
SHA3-384 hash: 2cfaa02f51d5c41bae1f439b11bf7739b24f28506595108d2acbcbcec0cb55b27e254214d7b2af67845bbfb6990c81cf
SHA1 hash: 0343fee261441fe523b557bdc63a49aa2d8b6fd9
MD5 hash: 8849ec79aac67ee11e47fca7938ccfb5
humanhash: hamper-charlie-three-violet
File name:3MLDad2sFoYnTE9.exe
Download: download sample
Signature PandaLogger
File size:782'336 bytes
First seen:2020-11-17 12:00:19 UTC
Last seen:2020-11-19 14:36:12 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'649 x AgentTesla, 19'453 x Formbook, 12'202 x SnakeKeylogger)
ssdeep 12288:QT3GdgptKViqk+ud1/yTGjxWHEdFOaYSYaFcskT8Mt8LFltA/zMclT:QLGdgXKViq+L/y4xyEdFOaYSYaFQ8g88
Threatray 976 similar samples on MalwareBazaar
TLSH F1F47CF6394FA64FC1AA3CB1CD5099042F7CAB13F506E316F89A22B834ED26957049F5
Reporter JAMESWT_WT
Tags:PandaLogger

Intelligence


File Origin
# of uploads :
3
# of downloads :
73
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the %AppData% directory
Creating a file in the %temp% directory
Launching a process
Creating a process with a hidden window
Deleting a recently created file
DNS request
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Sending an HTTP GET request
Reading critical registry keys
Enabling the 'hidden' option for files in the %temp% directory
Replacing files
Setting a keyboard event handler
Stealing user critical data
Enabling autorun by creating a file
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2020-11-17 09:04:11 UTC
File Type:
PE (.Net Exe)
Extracted files:
16
AV detection:
26 of 29 (89.66%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
persistence spyware
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Modifies service
Looks up external IP address via web service
Reads user/profile data of web browsers
Unpacked files
SH256 hash:
150f883f1a99dea83e3391920107220fd9794bdaacfb7dc482b44d00e7603023
MD5 hash:
8849ec79aac67ee11e47fca7938ccfb5
SHA1 hash:
0343fee261441fe523b557bdc63a49aa2d8b6fd9
SH256 hash:
aeaae8180b30182af9e42aafa0de1a061a1bce10948c8b9de3bd5f8fe2adc601
MD5 hash:
96aa287dcb3c5b06b61881db3aa24cca
SHA1 hash:
793c86490e59527b4be25d86d836184c90a0aba6
SH256 hash:
cb951f1d2b5460456aad0d89cef1216d9be5e51784d11a92447d43e96177bd5e
MD5 hash:
8cd5d2014866f4ef60802ff1826998a6
SHA1 hash:
8ff75946905d0b117080cc5a07e6e0bbea4e9bbd
SH256 hash:
f39fd19f8f387cab31f9fc40b034c970b543843a62c8ae7994fcec93098c9470
MD5 hash:
fb4778e9c6949585060b6f0e5a8a942a
SHA1 hash:
efeb66669b92fdc8b53c3777ede3faeb63a60e2c
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

PandaLogger

Executable exe 150f883f1a99dea83e3391920107220fd9794bdaacfb7dc482b44d00e7603023

(this sample)

  
Delivery method
Distributed via web download

Comments