MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 24755146beab096fd27442460942e816751b280a7fbc953fa949f1e53b30217b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
MassLogger
Vendor detections: 17
| SHA256 hash: | 24755146beab096fd27442460942e816751b280a7fbc953fa949f1e53b30217b |
|---|---|
| SHA3-384 hash: | 3e0317fe743363934cd4fcfd3785ecf6e6bacec66eb417aeada6be62be36ff6f419e5147d77ed41700f54d12d992013f |
| SHA1 hash: | b0b915d1fe041df0cc139636d5bc940d2e9045e9 |
| MD5 hash: | 40202a5559a71afdd8e9bc532f170209 |
| humanhash: | double-blossom-charlie-orange |
| File name: | Proforma Invoice.exe |
| Download: | download sample |
| Signature | MassLogger |
| File size: | 523'784 bytes |
| First seen: | 2025-06-02 07:20:28 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger) |
| ssdeep | 12288:pdVcBd3ES6fD/H4jbZlSXmJv6C0wtmn6Y2xxI85qcFCF+LfekR:p2i4jbE+S2sWxxIqq+7LN |
| Threatray | 3'141 similar samples on MalwareBazaar |
| TLSH | T119B40185177ADF02E6F34FF46962C2385BB82DCDE921D20A5EDAACDF34A9B042540747 |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10522/11/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4504/4/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| Magika | pebin |
| dhash icon | 0000000000000000 (872 x AgentTesla, 496 x Formbook, 296 x RedLineStealer) |
| Reporter | |
| Tags: | exe MassLogger |
Intelligence
File Origin
NLVendor Threat Intelligence
Result
Behaviour
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | INDICATOR_KB_CERT_7c1118cbbadc95da3752c46e47a27438 |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables signed with stolen, revoked or invalid certificates |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_RawPaste_URL |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables (downlaoders) containing URLs to raw contents of a paste |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | PE_Digital_Certificate |
|---|---|
| Author: | albertzsigovits |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | Sus_Obf_Enc_Spoof_Hide_PE |
|---|---|
| Author: | XiAnzheng |
| Description: | Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP) |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.