MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4c4f5e28a82948c32d36921367ab19ecc7c369b6c8fb7b479d108cf0d9c21b38. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



MassLogger


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: 4c4f5e28a82948c32d36921367ab19ecc7c369b6c8fb7b479d108cf0d9c21b38
SHA3-384 hash: 0771e4295a9ddadaf4ab5ad6a6cb66d9105323be29520e4f808ae543530dba48c7f18e80c390db65674c4bbbbab640ad
SHA1 hash: 5e7fa588a6addc45a444ca933b5cb709a3176e21
MD5 hash: 41792efb19eeac5a973b5c4046f741cb
humanhash: magazine-oklahoma-steak-sixteen
File name:Sep_offerAlumi_pdf.gz
Download: download sample
Signature MassLogger
File size:658'691 bytes
First seen:2020-10-13 17:53:31 UTC
Last seen:Never
File type: gz
MIME type:application/x-rar
ssdeep 12288:MXtmZFh4daFIXA7Gcg7VJ8yaOw22ooVgn0T3ADvHfxFLlB5/2++h:WcZFh4OGcggh18FHflKph
TLSH 1DE4237EF97D9FB1AC5985820EE15F02CE74E7E41B613438C9C2262AE270CB956580CF
Reporter abuse_ch
Tags:gz MassLogger


Avatar
abuse_ch
Malspam distributing MassLogger:

HELO: m9747.mail.qiye.163.com
Sending IP: 220.181.97.47
From: Sales <sales@jmv-top.com>
Subject: Sep_offerAlumi_pdf
Attachment: Sep_offerAlumi_pdf.gz (contains "Sep_offerAlumi_pdf.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
112
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
Win32.Trojan.AgentTesla
Status:
Malicious
First seen:
2020-10-13 11:49:07 UTC
AV detection:
22 of 48 (45.83%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

MassLogger

gz 4c4f5e28a82948c32d36921367ab19ecc7c369b6c8fb7b479d108cf0d9c21b38

(this sample)

  
Dropping
MassLogger
  
Delivery method
Distributed via e-mail attachment

Comments