MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2ae5d7a2c53dae715a36f67b8cdf5b6f861acb5b79792a74d34a1bcba03fd2ba. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



MassLogger


Vendor detections: 16


Intelligence 16 IOCs YARA 11 File information Comments

SHA256 hash: 2ae5d7a2c53dae715a36f67b8cdf5b6f861acb5b79792a74d34a1bcba03fd2ba
SHA3-384 hash: 68612979429b8bac31c2e1a2497cabd6ebc81dbf122dfb013669acf448af38f6ff32ab1177ab6d961e5a8fcae18429bf
SHA1 hash: 4c4c38c2770d1f07d2c94f93fab1fcd5eff0a85f
MD5 hash: da098f6572a365ded1e62afc5e9689a7
humanhash: nitrogen-massachusetts-gee-sad
File name:24f311baff086935d9e08a98a08b8d2d64d41ff1ef950a914f7205238bc5552a
Download: download sample
Signature MassLogger
File size:1'193'472 bytes
First seen:2026-02-05 15:41:01 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c1ce208b1192bfcf652c179f34f034d3 (36 x AgentTesla, 23 x Formbook, 8 x SnakeKeylogger)
ssdeep 24576:z5EmXFtKaL4/oFe5T9yyXYfP1MAXDzkVJtS40gmCeV5aE+:zPVt/LZeJbInGizkVG4J2X
Threatray 858 similar samples on MalwareBazaar
TLSH T1C445BE0273C1C066FFAB91734B5AF6115BBC79260123A62F13981D7ABE701B1563E7A3
TrID 50.4% (.EXE) Win32 EXE Yoda's Crypter (26569/9/4)
19.9% (.EXE) Win64 Executable (generic) (10522/11/4)
9.5% (.EXE) Win16 NE executable (generic) (5038/12/1)
8.5% (.EXE) Win32 Executable (generic) (4504/4/1)
3.8% (.EXE) OS/2 Executable (generic) (2029/13)
Magika pebin
dhash icon aae2f3e38383b629 (2'644 x Formbook, 1'203 x CredentialFlusher, 910 x AgentTesla)
Reporter abuse_ch
Tags:exe MassLogger upx-dec


Avatar
abuse_ch
UPX decompressed file, sourced from SHA256 24f311baff086935d9e08a98a08b8d2d64d41ff1ef950a914f7205238bc5552a
File size (compressed) :687'104 bytes
File size (de-compressed) :1'193'472 bytes
Format:win32/pe
Packed file: 24f311baff086935d9e08a98a08b8d2d64d41ff1ef950a914f7205238bc5552a

Intelligence


File Origin
# of uploads :
1
# of downloads :
88
Origin country :
NL NL
Vendor Threat Intelligence
Malware configuration found for:
AutoIt
Details
AutoIt
extracted scripts and files
Malware family:
n/a
ID:
1
File name:
24f311baff086935d9e08a98a08b8d2d64d41ff1ef950a914f7205238bc5552a
Verdict:
Malicious activity
Analysis date:
2026-02-05 20:52:59 UTC
Tags:
evasion snake keylogger telegram stealer netreactor

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.1%
Tags:
autoit emotet
Verdict:
Malicious
File Type:
exe x32
First seen:
2026-01-25T23:47:00Z UTC
Last seen:
2026-01-27T11:37:00Z UTC
Hits:
~10
Result
Threat name:
Snake Keylogger, VIP Keylogger
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Antivirus / Scanner detection for submitted sample
Binary is likely a compiled AutoIt script file
Found API chain indicative of sandbox detection
Found malware configuration
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for submitted file
Sample uses string decryption to hide its real strings
Suricata IDS alerts for network traffic
Switches to a custom stack to bypass stack traces
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
Yara detected Snake Keylogger
Yara detected Telegram RAT
Yara detected VIP Keylogger
Behaviour
Behavior Graph:
Gathering data
Threat name:
Win32.Backdoor.FormBook
Status:
Malicious
First seen:
2026-01-26 04:42:46 UTC
File Type:
PE (Exe)
Extracted files:
27
AV detection:
23 of 24 (95.83%)
Threat level:
  5/5
Result
Malware family:
vipkeylogger
Score:
  10/10
Tags:
family:vipkeylogger collection discovery keylogger stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Browser Information Discovery
System Location Discovery: System Language Discovery
AutoIT Executable
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Looks up external IP address via web service
VIPKeylogger
Vipkeylogger family
Unpacked files
SH256 hash:
2ae5d7a2c53dae715a36f67b8cdf5b6f861acb5b79792a74d34a1bcba03fd2ba
MD5 hash:
da098f6572a365ded1e62afc5e9689a7
SHA1 hash:
4c4c38c2770d1f07d2c94f93fab1fcd5eff0a85f
Detections:
AutoIT_Compiled
SH256 hash:
09029f91c9f9f79ae589218a7246919286c8cb78eda0d1e88a2b3c2a20ccaf50
MD5 hash:
f7bafa9a78a29829e1c40fce1bc29bdb
SHA1 hash:
153722d11f8f8f727bd930adcbc12a2e9b7ddcc9
Detections:
win_samsam_auto SUSP_OBF_NET_Reactor_Native_Stub_Jan24 MAL_Malware_Imphash_Mar23_1 MetaStealer_NET_Reactor_packer MALWARE_Win_RedLine
SH256 hash:
879e7710ed4b900db386685c56704e868f5c2adbeba79f5e2f48abc52db30fff
MD5 hash:
5bc4249ead3ef64f371accc8e381ecf3
SHA1 hash:
4157adeb8bf354e9763bf1c15de139332e8c64a5
Detections:
win_404keylogger_g1 win_masslogger_w0 SUSP_OBF_NET_Reactor_Indicators_Jan24 MAL_Envrial_Jan18_1 INDICATOR_SUSPICIOUS_Binary_References_Browsers INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients INDICATOR_SUSPICIOUS_EXE_DotNetProcHook INDICATOR_SUSPICIOUS_EXE_TelegramChatBot
SH256 hash:
313572345ae44fbe86302ffc5745cdf7cf345f1d6c054ddb4e503b6b8759690f
MD5 hash:
07c008bcdec1e04b9fca411aedcc3df0
SHA1 hash:
7edcf8b0f4ef1ed128b721edf6bf1e7aca2bb7ef
Detections:
win_404keylogger_g1 win_masslogger_w0 SUSP_OBF_NET_Reactor_Indicators_Jan24 RedLine_Campaign_June2021 MAL_Envrial_Jan18_1 INDICATOR_SUSPICIOUS_Binary_References_Browsers INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients INDICATOR_SUSPICIOUS_EXE_DotNetProcHook INDICATOR_SUSPICIOUS_EXE_TelegramChatBot
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AutoIT_Compiled
Author:@bartblaze
Description:Identifies compiled AutoIT script (as EXE). This rule by itself does NOT necessarily mean the detected file is malicious.
Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:MAL_Malware_Imphash_Mar23_1
Author:Arnim Rupp
Description:Detects malware by known bad imphash or rich_pe_header_hash
Reference:https://yaraify.abuse.ch/statistics/
Rule name:NET
Author:malware-lu
Rule name:pe_detect_tls_callbacks
Rule name:TH_Generic_MassHunt_Win_Malware_2025_CYFARE
Author:CYFARE
Description:Generic Windows malware mass-hunt rule - 2025
Reference:https://cyfare.net/
Rule name:win_samsam_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

MassLogger

Executable exe 2ae5d7a2c53dae715a36f67b8cdf5b6f861acb5b79792a74d34a1bcba03fd2ba

(this sample)

Comments