MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3cb34400272d280f1a8c20bd52402e85d825784620ea42b0e68cf94a4101f0de. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



MassLogger


Vendor detections: 5


Intelligence 5 IOCs YARA 1 File information Comments

SHA256 hash: 3cb34400272d280f1a8c20bd52402e85d825784620ea42b0e68cf94a4101f0de
SHA3-384 hash: 4beaae61b3e90e33572077c9990a38320166bc00935641fb984a9ed68bf4643c26c94a0b997952e3fd1c1015ad5da319
SHA1 hash: e5f212853846890ef0b5693170d23d8c62f60674
MD5 hash: fa392e8a9d22615b3149434c288d6bbd
humanhash: undress-potato-xray-quiet
File name:20200924-011.xls
Download: download sample
Signature MassLogger
File size:303'104 bytes
First seen:2020-09-24 18:16:04 UTC
Last seen:2020-09-25 07:18:25 UTC
File type:Excel file xls
MIME type:application/vnd.ms-excel
ssdeep 6144:Bk3hOdsylKlgryzc4bNhZF+E+W2kn8pEYz3yMMMWqenMnc7/zzs3u3StbKwVSalN:3pv3CMcvaJtew3lGOGxwuHY2
TLSH 235412A3B3D6F911CC0B173D16A31954632AEC715F6F930722A9FB0D4BB5791880B64B
Reporter abuse_ch
Tags:MassLogger xls


Avatar
abuse_ch
Malspam distributing MassLogger:

HELO: xvg0.906.gonbino.ml
Sending IP: 207.154.224.20
From: Kim CIL <admin_vn@cargointlogistics.com>
Subject: SI200188_20200924-011 SHIPPING ARRANGEMENT
Attachment: 20200924-011.xls

MassLogger payload URL:
http://5.149.252.252/9P/PO%202020-00368.jpg

MassLogger SMTP exfil email server:
mail.ziv-investment.com:26

MassLogger SMTP exfil email address:
engine@ziv-investment.com

Intelligence


File Origin
# of uploads :
3
# of downloads :
98
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Connecting to a non-recommended domain
Creating a file
Creating a file in the %temp% subdirectories
Running batch commands
Launching a process
Sending an HTTP GET request
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Creating a process from a recently created file
Result
Threat name:
MassLogger RAT
Detection:
malicious
Classification:
troj.expl.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
Allocates memory in foreign processes
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Creates an autostart registry key pointing to binary in C:\Windows
Document contains an embedded VBA with functions possibly related to ADO stream file operations
Document contains an embedded VBA with functions possibly related to HTTP operations
Document contains an embedded VBA with many randomly named variables
Document contains an embedded VBA with many string operations indicating source code obfuscation
Document exploit detected (creates forbidden files)
Document exploit detected (drops PE files)
Document exploit detected (process start blacklist hit)
Downloads files with wrong headers with respect to MIME Content-Type
Drops PE files to the user root directory
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
May check the online IP address of the machine
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Office process drops PE file
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Executables Started in Suspicious Folder
Sigma detected: Execution in Non-Executable Folder
Sigma detected: MS Office Product Spawning Exe in User Dir
Sigma detected: Suspicious Program Location Process Starts
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect virtualization through RDTSC time measurements
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Yara detected MassLogger RAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 289697 Sample: 20200924-011.xls Startdate: 24/09/2020 Architecture: WINDOWS Score: 100 44 mail.ziv-investment.com 2->44 62 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->62 64 Multi AV Scanner detection for domain / URL 2->64 66 Multi AV Scanner detection for dropped file 2->66 68 20 other signatures 2->68 9 EXCEL.EXE 57 24 2->9         started        14 pcalua.exe 1 2->14         started        signatures3 process4 dnsIp5 46 5.149.252.252, 49165, 80 HZ-CA-ASBG United Kingdom 9->46 38 C:\Users\user\...\PO%202020-00368[1].jpg, PE32 9->38 dropped 40 C:\Users\Public\svchost32.exe, PE32 9->40 dropped 78 Document exploit detected (creates forbidden files) 9->78 80 Document exploit detected (process start blacklist hit) 9->80 16 svchost32.exe 7 9->16         started        file6 signatures7 process8 file9 32 C:\Users\user\ublf.exe, PE32 16->32 dropped 34 C:\Users\user\AppData\...\InstallUtil.exe, PE32 16->34 dropped 36 C:\Users\user\AppData\Local\Temp\...\i.dll, PE32 16->36 dropped 54 Multi AV Scanner detection for dropped file 16->54 56 Machine Learning detection for dropped file 16->56 58 Drops PE files to the user root directory 16->58 60 Tries to detect virtualization through RDTSC time measurements 16->60 20 ublf.exe 2 16->20         started        23 cmd.exe 16->23         started        signatures10 process11 signatures12 70 Multi AV Scanner detection for dropped file 20->70 72 Machine Learning detection for dropped file 20->72 74 Writes to foreign memory regions 20->74 76 3 other signatures 20->76 25 InstallUtil.exe 12 2 20->25         started        30 reg.exe 1 23->30         started        process13 dnsIp14 48 elb097307-934924932.us-east-1.elb.amazonaws.com 54.235.169.38, 49166, 80 AMAZON-AESUS United States 25->48 50 nagano-19599.herokussl.com 25->50 52 api.ipify.org 25->52 42 C:\Users\user\AppData\Local\Temp\...\Log.txt, ASCII 25->42 dropped 82 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 25->82 84 Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent) 25->84 86 Creates an autostart registry key pointing to binary in C:\Windows 30->86 file15 signatures16
Threat name:
Script.Trojan.ZLoader
Status:
Malicious
First seen:
2020-09-24 13:40:47 UTC
AV detection:
17 of 29 (58.62%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
macro
Behaviour
Suspicious Office macro
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:SharedStrings
Author:Katie Kleemola
Description:Internal names found in LURK0/CCTV0 samples

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

MassLogger

Excel file xls 3cb34400272d280f1a8c20bd52402e85d825784620ea42b0e68cf94a4101f0de

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments