MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 1f84e1decce2a26f6d53ab98b1450c1c8b1bf9f93a36509ae1c07adbc4ef85d4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
a310Logger
Vendor detections: 15
| SHA256 hash: | 1f84e1decce2a26f6d53ab98b1450c1c8b1bf9f93a36509ae1c07adbc4ef85d4 |
|---|---|
| SHA3-384 hash: | 741f2b3aa4e4ba163830b3ee51c0764115eba0e93e7c194eeb16ef2bc955d47fafca28c6058c6add074b7f20db592bb4 |
| SHA1 hash: | 3a2c0be79c51209f007caca91e1846fd18e9643e |
| MD5 hash: | 6d1b566fa458e7901e61f5baa4cf6a9a |
| humanhash: | five-utah-green-wyoming |
| File name: | 1f84e1decce2a26f6d53ab98b1450c1c8b1bf9f93a36509ae1c07adbc4ef85d4 |
| Download: | download sample |
| Signature | a310Logger |
| File size: | 1'329'152 bytes |
| First seen: | 2025-12-08 15:36:27 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 1895460fffad9475fda0c84755ecfee1 (438 x Formbook, 138 x AgentTesla, 68 x a310Logger) |
| ssdeep | 24576:U5EmXFtKaL4/oFe5T9yyXYfP1ijXdam2cRdc+VKKMRdR:UPVt/LZeJbInQRamhtYN |
| Threatray | 994 similar samples on MalwareBazaar |
| TLSH | T17855CF0273D1C062FFAB96334B5AF61156BC7A260123E62F13981DB9BD701B1563E7A3 |
| TrID | 40.3% (.EXE) Win64 Executable (generic) (10522/11/4) 19.3% (.EXE) Win16 NE executable (generic) (5038/12/1) 17.2% (.EXE) Win32 Executable (generic) (4504/4/1) 7.7% (.EXE) OS/2 Executable (generic) (2029/13) 7.6% (.EXE) Generic Win/DOS Executable (2002/3) |
| Magika | pebin |
| Reporter | |
| Tags: | a310logger exe |
Intelligence
File Origin
HUVendor Threat Intelligence
Details
Result
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | AutoIT_Compiled |
|---|---|
| Author: | @bartblaze |
| Description: | Identifies compiled AutoIT script (as EXE). This rule by itself does NOT necessarily mean the detected file is malicious. |
| Rule name: | CP_Script_Inject_Detector |
|---|---|
| Author: | DiegoAnalytics |
| Description: | Detects attempts to inject code into another process across PE, ELF, Mach-O binaries |
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DetectEncryptedVariants |
|---|---|
| Author: | Zinyth |
| Description: | Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded |
| Rule name: | FreddyBearDropper |
|---|---|
| Author: | Dwarozh Hoshiar |
| Description: | Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip. |
| Rule name: | golang_bin_JCorn_CSC846 |
|---|---|
| Author: | Justin Cornwell |
| Description: | CSC-846 Golang detection ruleset |
| Rule name: | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables containing SQL queries to confidential data stores. Observed in infostealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_TelegramChatBot |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables using Telegram Chat Bot |
| Rule name: | MALWARE_Win_A310Logger |
|---|---|
| Author: | ditekSHen |
| Description: | Detects A310Logger |
| Rule name: | MALWARE_Win_DarkCloud |
|---|---|
| Author: | ditekSHen |
| Description: | Detects DarkCloud infostealer |
| Rule name: | pe_detect_tls_callbacks |
|---|
| Rule name: | ProtectSharewareV11eCompservCMS |
|---|---|
| Author: | malware-lu |
| Rule name: | RIPEMD160_Constants |
|---|---|
| Author: | phoul (@phoul) |
| Description: | Look for RIPEMD-160 constants |
| Rule name: | SEH__vba |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | SHA1_Constants |
|---|---|
| Author: | phoul (@phoul) |
| Description: | Look for SHA1 constants |
| Rule name: | TelegramAPIMalware_PowerShell_EXE |
|---|---|
| Author: | @polygonben |
| Description: | Hunting for pwsh malware using Telegram for C2 |
| Rule name: | telegram_bot_api |
|---|---|
| Author: | rectifyq |
| Description: | Detects file containing Telegram Bot API |
| Rule name: | TH_Generic_MassHunt_Win_Malware_2025_CYFARE |
|---|---|
| Author: | CYFARE |
| Description: | Generic Windows malware mass-hunt rule - 2025 |
| Reference: | https://cyfare.net/ |
| Rule name: | UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser |
|---|---|
| Author: | malware-lu |
| Rule name: | Windows_Trojan_DarkCloud_9905abce |
|---|---|
| Author: | Elastic Security |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.