MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 45af78cb765e9ddd6500353d4d9dd4ef34babb350a3813710b671dc4a35aa1fb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
MassLogger
Vendor detections: 15
| SHA256 hash: | 45af78cb765e9ddd6500353d4d9dd4ef34babb350a3813710b671dc4a35aa1fb |
|---|---|
| SHA3-384 hash: | d70e32c7b8b9b59225eb4e17e2e1a4da9ade6639833e6f8623b0bbde5b735da757210425a3e13b97ec7c209388a7e86a |
| SHA1 hash: | 02c3535ab3a1fe007519deeefcd65901a9c04740 |
| MD5 hash: | cc6b39621ea628eac27db89822370159 |
| humanhash: | delaware-massachusetts-friend-black |
| File name: | Debit Note.exe |
| Download: | download sample |
| Signature | MassLogger |
| File size: | 1'060'352 bytes |
| First seen: | 2025-04-14 06:33:58 UTC |
| Last seen: | 2025-04-15 07:11:22 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'657 x AgentTesla, 19'467 x Formbook, 12'206 x SnakeKeylogger) |
| ssdeep | 24576:1lMehEqvb3cLBD8Gqy2KlZi8z2fvGWhQx6hUmmwNdkeQYBT:LDEZBNqdKvCvLuxMFJ7T |
| Threatray | 3'133 similar samples on MalwareBazaar |
| TLSH | T11E358D45D2C9FC99C0072172983DF534281EF759A27BCC2A2A6E793561A7393306BF4E |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10522/11/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4504/4/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| Magika | pebin |
| dhash icon | d480aa8e96968ed8 (20 x AgentTesla, 15 x SnakeKeylogger, 13 x MassLogger) |
| Reporter | |
| Tags: | exe MassLogger |
Intelligence
File Origin
DEVendor Threat Intelligence
Result
Behaviour
Result
Signature
Behaviour
Result
Behaviour
Unpacked files
8357f957b093fda087166e77b0e6a59d8d0d2fde1002d0be9ce5f99db26d63bb
abf8078644761623df4bdd4616a35a12990ae27825d9a32a85d49098e17dba56
45af78cb765e9ddd6500353d4d9dd4ef34babb350a3813710b671dc4a35aa1fb
c2b0e9ffba919397a65722465c861d5b8c1d35d536c3ecd0c9a3b0f8034884d2
e6fe2241c57847a4911e325b6d3692839f9033de0c99ddeabd47e8d62022bcd1
bf73a2429c65f49ee778f1401c21a5ae4d655e6c17b61a6130fa024f54de1938
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | crime_snake_keylogger |
|---|---|
| Author: | Rony (r0ny_123) |
| Description: | Detects Snake keylogger payload |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_TelegramChatBot |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables using Telegram Chat Bot |
| Rule name: | masslogger_gcch |
|---|---|
| Author: | govcert_ch |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | RANSOMWARE |
|---|---|
| Author: | ToroGuitar |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | Sus_Obf_Enc_Spoof_Hide_PE |
|---|---|
| Author: | XiAnzheng |
| Description: | Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP) |
| Rule name: | telegram_bot_api |
|---|---|
| Author: | rectifyq |
| Description: | Detects file containing Telegram Bot API |
| Rule name: | Windows_Trojan_SnakeKeylogger_af3faa65 |
|---|---|
| Author: | Elastic Security |
| Rule name: | win_masslogger_w0 |
|---|---|
| Author: | govcert_ch |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (GUARD_CF) | high |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.