MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 50e10bd011719d1d3c43c1b6a945462a4684399a6f64dd264e8d03f0ac92c505. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



a310Logger


Vendor detections: 20


Intelligence 20 IOCs YARA 3 File information Comments

SHA256 hash: 50e10bd011719d1d3c43c1b6a945462a4684399a6f64dd264e8d03f0ac92c505
SHA3-384 hash: 4b880de616e185c990f528d70a0f7f6bc6dc8ee14e389afe3525010e7a5c282d33c3df0158d415fb45a347bcbfb24c27
SHA1 hash: 9438119bb30404b00f5f94cbbe67d2ffbecb39ef
MD5 hash: a4b392eef188ea519372c527a0267ecf
humanhash: mike-mexico-monkey-solar
File name:PRODUCTS LIST.scr
Download: download sample
Signature a310Logger
File size:950'272 bytes
First seen:2026-01-07 15:52:55 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'795 x AgentTesla, 19'693 x Formbook, 12'274 x SnakeKeylogger)
ssdeep 24576:HTrIQ/Mi4egFTf4+3GvT3srKuezrwIu1d8FN4J0bqaTheUeO:H/jgFj4+T2uOrjmiopaThepO
TLSH T10D151215235AC901C1D20FB6B971E3B03B289EDFB9A2D252AFC43FEF742A3941941356
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10522/11/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4504/4/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Magika pebin
Reporter lowmal3
Tags:a310logger exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
119
Origin country :
DE DE
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
PRODUCTS LIST.scr
Verdict:
Malicious activity
Analysis date:
2026-01-07 15:54:02 UTC
Tags:
stealer evasion telegram darkcloud upx ims-api generic

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
94.9%
Tags:
stration shell hype
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
DNS request
Creating a process with a hidden window
Unauthorized injection to a recently created process
Restart of the analyzed sample
Creating a file
Сreating synchronization primitives
Using the Windows Management Instrumentation requests
Connection attempt
Sending an HTTP GET request
Creating a file in the %AppData% subdirectories
Reading critical registry keys
Stealing user critical data
Adding an exclusion to Microsoft Defender
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
krypt masquerade packed
Verdict:
Malicious
File Type:
exe x32
First seen:
2026-01-07T06:24:00Z UTC
Last seen:
2026-01-09T09:16:00Z UTC
Hits:
~100
Detections:
BSS:Trojan.Win32.Generic Trojan.MSIL.Taskun.sb Trojan.MSIL.Crypt.sb Trojan-PSW.Win32.Stealer.sb HEUR:Trojan.MSIL.Injector.gen HEUR:Trojan.MSIL.Agent.gen Trojan-PSW.Win32.Stelega.sb Trojan-PSW.Win32.DarkCloud.sb Trojan.Win32.Agent.sb Trojan.MSIL.Inject.sb VHO:Backdoor.Win32.Androm.gen HEUR:Trojan-PSW.MSIL.PureLogs.gen HackTool.ReconScan.TCP.ServerRequest
Result
Threat name:
DarkCloud, PureLog Stealer
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Antivirus detection for dropped file
Found malware configuration
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Sample uses string decryption to hide its real strings
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Suricata IDS alerts for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Uses the Telegram API (likely for C&C communication)
Yara detected AntiVM3
Yara detected DarkCloud
Yara detected PureLog Stealer
Yara detected Telegram RAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1846160 Sample: PRODUCTS LIST.scr.exe Startdate: 07/01/2026 Architecture: WINDOWS Score: 100 46 api.telegram.org 2->46 48 showip.net 2->48 50 6 other IPs or domains 2->50 60 Suricata IDS alerts for network traffic 2->60 62 Found malware configuration 2->62 64 Malicious sample detected (through community Yara rule) 2->64 68 14 other signatures 2->68 10 PRODUCTS LIST.scr.exe 4 2->10         started        signatures3 66 Uses the Telegram API (likely for C&C communication) 46->66 process4 file5 40 C:\Users\user\...\PRODUCTS LIST.scr.exe.log, ASCII 10->40 dropped 70 Adds a directory exclusion to Windows Defender 10->70 14 PRODUCTS LIST.scr.exe 2 23 10->14         started        19 powershell.exe 23 10->19         started        21 PRODUCTS LIST.scr.exe 10->21         started        signatures6 process7 dnsIp8 52 api.telegram.org 149.154.166.110, 443, 49709 TELEGRAMRU United Kingdom 14->52 54 showip.net 162.55.60.2, 49689, 80 ACPCA United States 14->54 42 C:\Users\user\AppData\...\chrome.exe (copy), PE32 14->42 dropped 44 C:\Users\user\AppData\...\Project1.exe, PE32 14->44 dropped 56 Tries to harvest and steal browser information (history, passwords, etc) 14->56 23 chrome.exe 2 14->23         started        26 taskkill.exe 1 14->26         started        58 Loading BitLocker PowerShell Module 19->58 28 conhost.exe 19->28         started        file9 signatures10 process11 file12 38 C:\Program Filesbehaviorgraphoogle\...behaviorgraphoogle-Chrome.exe, PE32+ 23->38 dropped 30 Google-Chrome.exe 1 23->30         started        32 conhost.exe 26->32         started        process13 process14 34 WerFault.exe 19 16 30->34         started        36 conhost.exe 30->36         started       
Verdict:
inconclusive
YARA:
10 match(es)
Tags:
.Net Executable Managed .NET PDB Path PE (Portable Executable) PE File Layout SOS: 0.51 Win 32 Exe x86
Threat name:
Win32.Backdoor.FormBook
Status:
Malicious
First seen:
2026-01-07 13:07:21 UTC
File Type:
PE (.Net Exe)
Extracted files:
8
AV detection:
14 of 24 (58.33%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
darkcloudstealer unc_loader_078
Similar samples:
Result
Malware family:
darkcloud
Score:
  10/10
Tags:
family:darkcloud defense_evasion discovery execution spyware stealer
Behaviour
Kills process with taskkill
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Program Files directory
Suspicious use of SetThreadContext
Checks computer location settings
Executes dropped EXE
Reads WinSCP keys stored on the system
Reads user/profile data of web browsers
Command and Scripting Interpreter: PowerShell
DarkCloud
Darkcloud family
Unpacked files
SH256 hash:
50e10bd011719d1d3c43c1b6a945462a4684399a6f64dd264e8d03f0ac92c505
MD5 hash:
a4b392eef188ea519372c527a0267ecf
SHA1 hash:
9438119bb30404b00f5f94cbbe67d2ffbecb39ef
SH256 hash:
86a403056da7a6389f83c148d87ee95568f90d700a25d87b0fa6414aea2aab77
MD5 hash:
d6adf7840affdad7a59601a820361444
SHA1 hash:
0c0d2950a0714588c8343c130a03e8bc07c35ca5
Detections:
SUSP_OBF_NET_ConfuserEx_Name_Pattern_Jan24 SUSP_OBF_NET_Reactor_Indicators_Jan24
SH256 hash:
d02dd5a8aa804e5cdde78684e4d40bba17c0ec143503e9ea5cbe2b27a95a8117
MD5 hash:
c191b61cebdd664beb166c164560d845
SHA1 hash:
195f6b1a213f9b03f1ada616a516924e4aa926d0
SH256 hash:
80a751f142b9d4a1a8e2fac9eb44ac653ad96ba394e42f162998b82a2c32700f
MD5 hash:
5b73bacd434303e4081f910a39a34c65
SHA1 hash:
8534e36e7b7fad4fec70dee6082c04caf3cfaa42
Detections:
darkcloudstealer INDICATOR_SUSPICIOUS_Binary_References_Browsers INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore INDICATOR_SUSPICIOUS_EXE_TelegramChatBot MALWARE_Win_A310Logger MALWARE_Win_DarkCloud
SH256 hash:
3b75425895af4ae3186b36277553641e37ca1d620ae18d68e40d13351b54de6a
MD5 hash:
94d1531b52774dce52a89e33646d5b1d
SHA1 hash:
29bf887b025b97bd7a9e1e261852ba824234a625
Malware family:
DarkCloud
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NET
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

a310Logger

Executable exe 50e10bd011719d1d3c43c1b6a945462a4684399a6f64dd264e8d03f0ac92c505

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments