MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5706101b5ffaf565a5690227f1c273b174eb2dcd3565904984a36be84eca6645. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry


Intelligence File information Yara 1 Comments

SHA256 hash: 5706101b5ffaf565a5690227f1c273b174eb2dcd3565904984a36be84eca6645
SHA3-384 hash: be2f458cdcc7b7eacedbc2457e85396b818bc0804f4416b6653508d61e92457acd9dc906e9e71cffc5df5ae0c417f2a6
SHA1 hash: 5646780e86a56c0944390329fea572fd58f7b516
MD5 hash: 9d19f77cd81399ccbf1e03ad9c88480f
humanhash: kansas-blue-winner-alaska
File name:PE 10563.exe
Download: download sample
Signature MassLogger
File size:769'536 bytes
First seen:2020-06-29 18:00:20 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744
ssdeep 12288:XQ4+d5P6GXAKollr/NTs2g8wA2z4P0nuMJJib1d9YbGnNdsEJQDXVBrq5Ng2GWgC:Xod8Gcr1T0Zbn7JJixdNaEJKne5u259t
TLSH B1F41224724D5877DAA90AFA8443A94103F55C79AC61F3E76DC9B0E824F37CE0982E77
Reporter @abuse_ch
Tags:exe MassLogger


Twitter
@abuse_ch
Malspam distributing MassLogger:

HELO: rujaapparels.com
Sending IP: 45.138.172.165
From: Jahir <Jahir@rujaapparels.com>
Subject: RE: Shipment
Attachment: PE 10563.r00 (contains "PE 10563.exe")

MassLogger SMTP exfil server:
us2.smtp.mailhostbox.com:587

Intelligence


File Origin
# of uploads :
1
# of downloads :
32
Origin country :
US US
Mail intelligence
Geo location:
Global
Volume:
Low
Vendor Threat Intelligence
Threat name:
ByteCode-MSIL.Trojan.Kryptik
Status:
Malicious
First seen:
2020-06-29 17:52:09 UTC
AV detection:
24 of 31 (77.42%)
Threat level
  5/5
Result
Malware family:
masslogger
Score:
  10/10
Tags:
ransomware spyware stealer family:masslogger
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious behavior: AddClipboardFormatListener
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Creates scheduled task(s)
Suspicious use of SetThreadContext
Looks up external IP address via web service
Reads user/profile data of web browsers
MassLogger log file
MassLogger

Yara Signatures


Rule name:masslogger_gcch
Author:govcert_ch

File information


The table below shows additional information about this malware sample such as delivery method and external references.

e936bd76fde1cde8a00ba008a4c30d7b

MassLogger

Executable exe 5706101b5ffaf565a5690227f1c273b174eb2dcd3565904984a36be84eca6645

(this sample)

  
Dropped by
MD5 e936bd76fde1cde8a00ba008a4c30d7b
  
Delivery method
Distributed via e-mail attachment

Comments