MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 48cad358250f70cffecaed785f4d128f48174adc0ee5948e00ab1b6ffbef803c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry


Intelligence File information Yara 1 Comments

SHA256 hash: 48cad358250f70cffecaed785f4d128f48174adc0ee5948e00ab1b6ffbef803c
SHA3-384 hash: ccc4fce9617ad6d590ea6904cfd78b942268b558925b5dd0fdbb10ead5ef42b5f52b840b30f6abde47b0fc16ad9baf95
SHA1 hash: d827d7eb28fc2077dd887aef57d0862f7c048860
MD5 hash: 0bcff00665c7d39364e53f1c2a1033d2
humanhash: nineteen-cup-east-lemon
File name:img00001.exe
Download: download sample
Signature MassLogger
File size:1'174'016 bytes
First seen:2020-06-29 06:36:16 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744
ssdeep 12288:jeLwcXFbVJ9Jh93yljni5Zixrajf0O9ozYoq9MqKeBFv6eF5rGK1bM:ywcXdL9J2LiDix+T0PECe76eFgK1bM
TLSH 324528403EB0DC12D89A02B094147EEB1D3D7D43E4E4E16BBA623A9475725BFE5B8C0E
Reporter @abuse_ch
Tags:exe MassLogger


Twitter
@abuse_ch
Malspam distributing MassLogger:

HELO: delivery.mailspamprotection.com
Sending IP: 146.66.121.9
From: James Smith<info@oasisgrace.com>
Reply-To: James Smith<newlogs147@gmail.com>
Subject: Very Urgent
Attachment: img00001.z (contains "img00001.exe")

MassLogger SMTP exfil server:
mail.mytravelexplorer.com:587

Intelligence


File Origin
# of uploads :
1
# of downloads :
28
Origin country :
US US
Mail intelligence
Geo location:
Global
Volume:
Low
Vendor Threat Intelligence
Threat name:
ByteCode-MSIL.Spyware.Negasteal
Status:
Malicious
First seen:
2020-06-29 06:38:06 UTC
AV detection:
23 of 31 (74.19%)
Threat level
  2/5
Result
Malware family:
masslogger
Score:
  10/10
Tags:
ransomware spyware stealer family:masslogger
Behaviour
Creates scheduled task(s)
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetThreadContext
Looks up external IP address via web service
Reads user/profile data of web browsers
MassLogger
MassLogger log file

Yara Signatures


Rule name:masslogger_gcch
Author:govcert_ch

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

MassLogger

Executable exe 48cad358250f70cffecaed785f4d128f48174adc0ee5948e00ab1b6ffbef803c

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments