MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 3f358937a974384f66ac6a4643243baf6690d5e9292e5bcc23e4b27aa74c722e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
MassLogger
Vendor detections: 16
| SHA256 hash: | 3f358937a974384f66ac6a4643243baf6690d5e9292e5bcc23e4b27aa74c722e |
|---|---|
| SHA3-384 hash: | b30e70264a16d22e6cf90ebf17d82bd3920e5b5898f9e30c6380214ba926e590a4620d59b891a0ba2f7a944525040f2b |
| SHA1 hash: | 3de54b83596b45581c3f3b5dd0e95b16ad451dcb |
| MD5 hash: | 85ab96fb1f88a7c361d338143a210857 |
| humanhash: | california-beryllium-harry-red |
| File name: | CloudServices.exe |
| Download: | download sample |
| Signature | MassLogger |
| File size: | 91'648 bytes |
| First seen: | 2025-05-12 16:18:55 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger) |
| ssdeep | 1536:emhwSMgDbSiFkOmH1BUsd1LE+cweFMRHBLpbokqR:3wSMgDbSwkOmH1BUsdNEFMTLpNi |
| Threatray | 980 similar samples on MalwareBazaar |
| TLSH | T1E093084933E88824E9BE8532E57140510B7BFC594935E26D1BD9B4ED2F7BA8085C3BE3 |
| TrID | 66.5% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 9.5% (.EXE) Win64 Executable (generic) (10522/11/4) 5.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.5% (.EXE) Win16 NE executable (generic) (5038/12/1) 4.0% (.EXE) Win32 Executable (generic) (4504/4/1) |
| Magika | pebin |
| Reporter | |
| Tags: | exe MassLogger |
Intelligence
File Origin
USVendor Threat Intelligence
Result
Behaviour
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | crime_snake_keylogger |
|---|---|
| Author: | Rony (r0ny_123) |
| Description: | Detects Snake keylogger payload |
| Rule name: | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_TelegramChatBot |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables using Telegram Chat Bot |
| Rule name: | MAL_Envrial_Jan18_1 |
|---|---|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects Encrial credential stealer malware |
| Reference: | https://twitter.com/malwrhunterteam/status/953313514629853184 |
| Rule name: | MAL_Envrial_Jan18_1_RID2D8C |
|---|---|
| Author: | Florian Roth |
| Description: | Detects Encrial credential stealer malware |
| Reference: | https://twitter.com/malwrhunterteam/status/953313514629853184 |
| Rule name: | masslogger_gcch |
|---|---|
| Author: | govcert_ch |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | RANSOMWARE |
|---|---|
| Author: | ToroGuitar |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | telegram_bot_api |
|---|---|
| Author: | rectifyq |
| Description: | Detects file containing Telegram Bot API |
| Rule name: | Windows_Trojan_SnakeKeylogger_af3faa65 |
|---|---|
| Author: | Elastic Security |
| Rule name: | win_masslogger_w0 |
|---|---|
| Author: | govcert_ch |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (GUARD_CF) | high |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.