MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 573e16a4a35ec55ee3c741b758f605ac0866ed587412aea28f458756e7e57fd5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



a310Logger


Vendor detections: 6


Intelligence 6 IOCs YARA 7 File information Comments

SHA256 hash: 573e16a4a35ec55ee3c741b758f605ac0866ed587412aea28f458756e7e57fd5
SHA3-384 hash: 2aa4cc9448102fc7557236874aa2a64f76b5bfb63fc77dcc623868096eabb286d90e0290bceb03a2f907aa834d8d4839
SHA1 hash: ab2a9e87da50ef8c5e93a65dbd5fbe19b8f634d7
MD5 hash: 3fa2b40e42fe955a6ef636ae9ea82dc6
humanhash: rugby-stream-pluto-princess
File name:Invoice payment-102023.r00
Download: download sample
Signature a310Logger
File size:848'749 bytes
First seen:2023-05-10 06:30:45 UTC
Last seen:Never
File type: r00
MIME type:application/x-rar
ssdeep 12288:hL6Vr6TvnteDhOVM1RZaMNqdFCT/FtC7qmvbo6wV5MrG04Lv0A:J6Vraq4WjDqWT/FkUpurG04LB
TLSH T1650533624B37567CDB663A36757379009051F2C714E22872284790F6B6E7FE8F22B42E
TrID 58.3% (.RAR) RAR compressed archive (v-4.x) (7000/1)
41.6% (.RAR) RAR compressed archive (gen) (5000/1)
Reporter cocaman
Tags:a310logger INVOICE payment r00


Avatar
cocaman
Malicious email (T1566.001)
From: "Accounts <director@matexcomposites.com>" (likely spoofed)
Received: "from matexcomposites.com (unknown [95.214.27.113]) "
Date: "10 May 2023 06:35:02 +0200"
Subject: "Re: Invoice payment"
Attachment: "Invoice payment-102023.r00"

Intelligence


File Origin
# of uploads :
1
# of downloads :
149
Origin country :
CH CH
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:Invoice payment-102023.exe
File size:1'162'752 bytes
SHA256 hash: e5615a6c90478a371040d8f7d4721e183b5efcc0b0e6ce64b7ab4ee1d04bf0be
MD5 hash: f769df90bf6724acb38372442936f56f
MIME type:application/x-dosexec
Signature a310Logger
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.RemLoader
Status:
Malicious
First seen:
2023-05-10 06:31:07 UTC
File Type:
Binary (Archive)
Extracted files:
34
AV detection:
19 of 37 (51.35%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:INDICATOR_SUSPICIOUS_Binary_References_Browsers
Author:ditekSHen
Description:Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:INDICATOR_SUSPICIOUS_EXE_TelegramChatBot
Author:ditekSHen
Description:Detects executables using Telegram Chat Bot
Rule name:MALWARE_Win_A310Logger
Author:ditekSHen
Description:Detects A310Logger
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

a310Logger

r00 573e16a4a35ec55ee3c741b758f605ac0866ed587412aea28f458756e7e57fd5

(this sample)

  
Delivery method
Distributed via e-mail attachment
  
Dropping
a310Logger

Comments