MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 3185fda0fc51f13b3e375810b920eb68a4840fc4e79a23250a0052ba13f1acea. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
MassLogger
Vendor detections: 14
| SHA256 hash: | 3185fda0fc51f13b3e375810b920eb68a4840fc4e79a23250a0052ba13f1acea |
|---|---|
| SHA3-384 hash: | b71e1823c2d3ebe2afc6e4b91265d91da7539d278c41667e48d6073fd72e623c674a679b8f772cc30c84ee3dcbb799bf |
| SHA1 hash: | 63c7a2293b1bddfd676ae96d072bd427d6ea6e0b |
| MD5 hash: | 197781125cca37ab4fa0439efa31ad43 |
| humanhash: | missouri-hawaii-mockingbird-fish |
| File name: | 89940996_BESOZT00_2025_24850553_1_4_1.exe |
| Download: | download sample |
| Signature | MassLogger |
| File size: | 1'113'600 bytes |
| First seen: | 2025-03-03 15:07:31 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | afcdf79be1557326c854b6e20cb900a7 (1'102 x FormBook, 936 x AgentTesla, 399 x RemcosRAT) |
| ssdeep | 24576:eu6J33O0c+JY5UZ+XC0kGso6FadFPYu50IzT1NfiWY:wu0c++OCvkGs9Fadpzj5Y |
| TLSH | T1A935BE2273DDC360CB669173BF2AB7016EBF7C614630B85B1F980D7DA950162262D7A3 |
| TrID | 63.7% (.CPL) Windows Control Panel Item (generic) (57583/11/19) 11.6% (.EXE) Win64 Executable (generic) (10522/11/4) 7.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 5.5% (.EXE) Win16 NE executable (generic) (5038/12/1) 4.9% (.EXE) Win32 Executable (generic) (4504/4/1) |
| Magika | pebin |
| dhash icon | aae2f3e38383b629 (2'034 x Formbook, 1'183 x CredentialFlusher, 666 x AgentTesla) |
| Reporter | |
| Tags: | exe MassLogger |
Intelligence
File Origin
CHVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | AutoIT_Compiled |
|---|---|
| Author: | @bartblaze |
| Description: | Identifies compiled AutoIT script (as EXE). This rule by itself does NOT necessarily mean the detected file is malicious. |
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | golang_bin_JCorn_CSC846 |
|---|---|
| Author: | Justin Cornwell |
| Description: | CSC-846 Golang detection ruleset |
| Rule name: | SUSP_Imphash_Mar23_3 |
|---|---|
| Author: | Arnim Rupp (https://github.com/ruppde) |
| Description: | Detects imphash often found in malware samples (Maximum 0,25% hits with search for 'imphash:x p:0' on Virustotal) = 99,75% hits |
| Reference: | Internal Research |
| Rule name: | Sus_Obf_Enc_Spoof_Hide_PE |
|---|---|
| Author: | XiAnzheng |
| Description: | Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP) |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
| CHECK_NX | Missing Non-Executable Memory Protection | critical |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| AUTH_API | Manipulates User Authorization | ADVAPI32.dll::AllocateAndInitializeSid ADVAPI32.dll::CopySid ADVAPI32.dll::FreeSid ADVAPI32.dll::GetLengthSid ADVAPI32.dll::GetTokenInformation ADVAPI32.dll::GetAce |
| COM_BASE_API | Can Download & Execute components | ole32.dll::CLSIDFromProgID ole32.dll::CoCreateInstance ole32.dll::CoCreateInstanceEx ole32.dll::CoInitializeSecurity ole32.dll::CreateStreamOnHGlobal |
| MULTIMEDIA_API | Can Play Multimedia | WINMM.dll::mciSendStringW WINMM.dll::timeGetTime WINMM.dll::waveOutSetVolume |
| SECURITY_BASE_API | Uses Security Base API | ADVAPI32.dll::AddAce ADVAPI32.dll::AdjustTokenPrivileges ADVAPI32.dll::CheckTokenMembership ADVAPI32.dll::DuplicateTokenEx ADVAPI32.dll::GetAclInformation ADVAPI32.dll::GetSecurityDescriptorDacl |
| SHELL_API | Manipulates System Shell | SHELL32.dll::ShellExecuteExW SHELL32.dll::ShellExecuteW SHELL32.dll::SHFileOperationW |
| WIN32_PROCESS_API | Can Create Process and Threads | ADVAPI32.dll::CreateProcessAsUserW KERNEL32.dll::CreateProcessW ADVAPI32.dll::CreateProcessWithLogonW KERNEL32.dll::OpenProcess ADVAPI32.dll::OpenProcessToken ADVAPI32.dll::OpenThreadToken |
| WIN_BASE_API | Uses Win Base API | KERNEL32.dll::TerminateProcess KERNEL32.dll::SetSystemPowerState KERNEL32.dll::LoadLibraryA KERNEL32.dll::LoadLibraryExW KERNEL32.dll::LoadLibraryW KERNEL32.dll::GetDriveTypeW |
| WIN_BASE_EXEC_API | Can Execute other programs | KERNEL32.dll::WriteConsoleW KERNEL32.dll::ReadConsoleW KERNEL32.dll::SetStdHandle KERNEL32.dll::GetConsoleCP KERNEL32.dll::GetConsoleMode |
| WIN_BASE_IO_API | Can Create Files | KERNEL32.dll::CopyFileExW KERNEL32.dll::CopyFileW KERNEL32.dll::CreateDirectoryW KERNEL32.dll::CreateHardLinkW IPHLPAPI.DLL::IcmpCreateFile KERNEL32.dll::CreateFileW |
| WIN_BASE_USER_API | Retrieves Account Information | KERNEL32.dll::GetComputerNameW ADVAPI32.dll::GetUserNameW ADVAPI32.dll::LogonUserW ADVAPI32.dll::LookupPrivilegeValueW |
| WIN_NETWORK_API | Supports Windows Networking | MPR.dll::WNetAddConnection2W MPR.dll::WNetUseConnectionW |
| WIN_REG_API | Can Manipulate Windows Registry | ADVAPI32.dll::RegConnectRegistryW ADVAPI32.dll::RegCreateKeyExW ADVAPI32.dll::RegDeleteKeyW ADVAPI32.dll::RegOpenKeyExW ADVAPI32.dll::RegQueryValueExW ADVAPI32.dll::RegSetValueExW |
| WIN_USER_API | Performs GUI Actions | USER32.dll::BlockInput USER32.dll::CloseDesktop USER32.dll::CreateMenu USER32.dll::EmptyClipboard USER32.dll::FindWindowExW USER32.dll::FindWindowW |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.