MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 284ce975050009d5c7bce4ad0c02f03a4cf70bad620e10822a4f4ad65e567127. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



MassLogger


Vendor detections: 11


Intelligence 11 IOCs YARA 15 File information Comments

SHA256 hash: 284ce975050009d5c7bce4ad0c02f03a4cf70bad620e10822a4f4ad65e567127
SHA3-384 hash: 63ca7b5569834864c2e710408da96516004674c2b2ed8f03a7192b9f4dbe9ffde1f83c764973c7c8ac1e1b485e576581
SHA1 hash: 4eb01ce6bca7b47855b542c81e2ef0c4c6f36947
MD5 hash: 40d391ed72c4072edd5404a9a6b33bca
humanhash: carolina-winner-twenty-oregon
File name:40d391ed72c4072edd5404a9a6b33bca.exe
Download: download sample
Signature MassLogger
File size:416'184 bytes
First seen:2022-07-23 15:54:49 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 98f67c550a7da65513e63ffd998f6b2e (21 x SnakeKeylogger, 13 x MassLogger, 11 x CryptOne)
ssdeep 6144:UvEN2U+T6i5LirrllHy4HUcMQY6W99999999999999999999999999999999999R:GENN+T5xYrllrU7QY6/rE
TLSH T14C944A6AF748712FF5A2C9F1256362957A257D321FA1AC0F63C12B2938B5603B5B031F
TrID 58.8% (.EXE) Win32 Executable Microsoft Visual Basic 6 (82067/2/8)
22.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
7.5% (.EXE) Win64 Executable (generic) (10523/12/4)
3.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
3.2% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 20047c7c60e0e002 (6 x MassLogger, 2 x Neshta, 1 x a310Logger)
Reporter abuse_ch
Tags:exe MassLogger

Intelligence


File Origin
# of uploads :
1
# of downloads :
441
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a window
Creating a file
Creating a process from a recently created file
Creating a process with a hidden window
Launching a process
Creating a file in the Windows subdirectories
Enabling the 'hidden' option for recently created files
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Setting a keyboard event handler
Setting a global event handler
Creating a file in the %AppData% directory
DNS request
Sending an HTTP GET request
Reading critical registry keys
Setting a single autorun event
Launching the process to create tasks for the scheduler
Stealing user critical data
Unauthorized injection to a system process
Enabling autorun
Enabling a "Do not show hidden files" option
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
greyware keylogger overlay shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
CryptOne, StormKitty
Detection:
malicious
Classification:
rans.troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Changes security center settings (notifications, updates, antivirus, firewall)
Creates an undocumented autostart registry key
Detected CryptOne packer
Drops executables to the windows directory (C:\Windows) and starts them
Drops PE files with benign system names
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Potential malicious icon found
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Generic Downloader
Yara detected StormKitty Stealer
Yara detected Telegram RAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 672275 Sample: m7iukFCY93.exe Startdate: 23/07/2022 Architecture: WINDOWS Score: 100 92 Potential malicious icon found 2->92 94 Malicious sample detected (through community Yara rule) 2->94 96 Antivirus detection for dropped file 2->96 98 9 other signatures 2->98 11 m7iukFCY93.exe 1 4 2->11         started        15 svchost.exe 2->15         started        17 explorer.exe 2->17         started        19 6 other processes 2->19 process3 dnsIp4 72 C:\Users\user\Desktop\m7iukfcy93.exe, PE32 11->72 dropped 74 C:\Users\user\AppData\Local\icsys.icn.exe, PE32 11->74 dropped 132 Installs a global keyboard hook 11->132 22 icsys.icn.exe 3 11->22         started        26 m7iukfcy93.exe 1 11->26         started        134 Changes security center settings (notifications, updates, antivirus, firewall) 15->134 78 127.0.0.1 unknown unknown 19->78 80 192.168.2.1 unknown unknown 19->80 file5 signatures6 process7 file8 66 C:\Windows\System\explorer.exe, PE32 22->66 dropped 108 Antivirus detection for dropped file 22->108 110 Machine Learning detection for dropped file 22->110 112 Drops executables to the windows directory (C:\Windows) and starts them 22->112 120 2 other signatures 22->120 28 explorer.exe 1 20 22->28         started        114 Writes to foreign memory regions 26->114 116 Allocates memory in foreign processes 26->116 118 Injects a PE file into a foreign processes 26->118 33 AppLaunch.exe 15 3 26->33         started        signatures9 process10 dnsIp11 82 vccmd01.zxq.net 51.81.194.202, 443, 49760, 49761 OVHFR United States 28->82 84 zxq.net 28->84 90 5 other IPs or domains 28->90 76 C:\Windows\System\spoolsv.exe, PE32 28->76 dropped 136 Antivirus detection for dropped file 28->136 138 System process connects to network (likely due to code injection or exploit) 28->138 140 Creates an undocumented autostart registry key 28->140 148 3 other signatures 28->148 35 spoolsv.exe 2 28->35         started        86 icanhazip.com 104.18.114.97, 49754, 80 CLOUDFLARENETUS United States 33->86 88 202.200.1.0.in-addr.arpa 33->88 142 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 33->142 144 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 33->144 146 May check the online IP address of the machine 33->146 150 2 other signatures 33->150 file12 signatures13 process14 file15 64 C:\Windows\System\svchost.exe, PE32 35->64 dropped 100 Antivirus detection for dropped file 35->100 102 Machine Learning detection for dropped file 35->102 104 Drops executables to the windows directory (C:\Windows) and starts them 35->104 106 2 other signatures 35->106 39 svchost.exe 5 4 35->39         started        signatures16 process17 file18 68 C:\Users\user\AppData\Roaming\mrsys.exe, PE32 39->68 dropped 70 C:\Users\user\AppData\Local\stsys.exe, PE32 39->70 dropped 122 Antivirus detection for dropped file 39->122 124 Detected CryptOne packer 39->124 126 Machine Learning detection for dropped file 39->126 128 3 other signatures 39->128 43 spoolsv.exe 39->43         started        46 at.exe 39->46         started        48 at.exe 39->48         started        50 18 other processes 39->50 signatures19 process20 signatures21 130 Installs a global keyboard hook 43->130 52 conhost.exe 46->52         started        54 conhost.exe 48->54         started        56 conhost.exe 50->56         started        58 conhost.exe 50->58         started        60 conhost.exe 50->60         started        62 14 other processes 50->62 process22
Threat name:
Win32.Trojan.Swisyn
Status:
Malicious
First seen:
2022-07-22 17:39:21 UTC
File Type:
PE (Exe)
Extracted files:
9
AV detection:
26 of 26 (100.00%)
Threat level:
  5/5
Verdict:
malicious
Gathering data
Unpacked files
SH256 hash:
c09affd5fddb9ca441374ffb348376e6f25b9fc4ffa7e4da29fbbdca4c32c043
MD5 hash:
f77ab6497bbf34bc635dc4f790c02ead
SHA1 hash:
416e499335a6dda176d50f532a4c7f067d1d178f
Detections:
win_agent_tesla_g2
Parent samples :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 hash:
d18a31446791586868c3734ce1268e98fe003130cb2acd3eb39c076490b55629
MD5 hash:
5667ba0768b88bb02b5cac03f1d4fedc
SHA1 hash:
f3ad014296c70962f4c6d45290260d5604f43bcf
SH256 hash:
284ce975050009d5c7bce4ad0c02f03a4cf70bad620e10822a4f4ad65e567127
MD5 hash:
40d391ed72c4072edd5404a9a6b33bca
SHA1 hash:
4eb01ce6bca7b47855b542c81e2ef0c4c6f36947
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_Binary_References_Browsers
Author:ditekSHen
Description:Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
Rule name:INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store
Author:ditekSHen
Description:Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients
Author:ditekSHen
Description:Detects executables referencing many email and collaboration clients. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_TelegramChatBot
Author:ditekSHen
Description:Detects executables using Telegram Chat Bot
Rule name:malware_Agenttesla_type2
Author:JPCERT/CC Incident Response Group
Description:detect Agenttesla in memory
Reference:internal research
Rule name:MALWARE_Win_A310Logger
Author:ditekSHen
Description:Detects A310Logger
Rule name:MALWARE_Win_StormKitty
Author:ditekSHen
Description:Detects StormKitty infostealer
Rule name:masslogger_gcch
Author:govcert_ch
Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB
Rule name:pe_imphash
Rule name:Quasar_RAT_1
Author:Florian Roth
Description:Detects Quasar RAT
Reference:https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf
Rule name:Quasar_RAT_1_RID2B54
Author:Florian Roth
Description:Detects Quasar RAT
Reference:https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:SUSP_DOTNET_PE_List_AV
Author:SECUINFRA Falcon Team
Description:Detecs .NET Binary that lists installed AVs
Rule name:win_masslogger_w0
Author:govcert_ch

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

MassLogger

Executable exe 284ce975050009d5c7bce4ad0c02f03a4cf70bad620e10822a4f4ad65e567127

(this sample)

  
Delivery method
Distributed via web download

Comments