MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 57ade73fa55896090db5172300e4bfbd2667547843c6e278db4b16ad7cec4f15. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



MassLogger


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 57ade73fa55896090db5172300e4bfbd2667547843c6e278db4b16ad7cec4f15
SHA3-384 hash: 402a292ac0db9585e3a620a2f64e8429a12a3156b269e8548b84bd6fe9293dc2b52e7f5213b6019ad10a0dd745cdd88d
SHA1 hash: c82f9de87c4975f747cd1bb0bf333551671b13f7
MD5 hash: 74a13247008d2d71236d03958643e1ac
humanhash: equal-jig-king-triple
File name:Asia International Trading - Products & Specifications List.exe
Download: download sample
Signature MassLogger
File size:379'904 bytes
First seen:2022-11-01 13:17:31 UTC
Last seen:2022-11-02 06:53:06 UTC
File type:Executable exe
MIME type:application/x-dosexec
ssdeep 768:ROsT1nFnyAWkaHRQ2wdzd4H4447iiL16HtYcFmVc6K:9T1FyAWNHRdmzd4H444l6fmVcl
Threatray 3'344 similar samples on MalwareBazaar
TLSH T1FB848991AF6494B4E921FCB12799E735D25B6CA636102F427C84339B76F36D0BF03268
TrID 63.5% (.EXE) Win64 Executable (generic) (10523/12/4)
12.2% (.EXE) OS/2 Executable (generic) (2029/13)
12.0% (.EXE) Generic Win/DOS Executable (2002/3)
12.0% (.EXE) DOS Executable Generic (2000/1)
File icon (PE):PE icon
dhash icon 36c29292b2e88c82 (54 x AgentTesla, 33 x RedLineStealer, 11 x Formbook)
Reporter malwarelabnet
Tags:exe MassLogger

Intelligence


File Origin
# of uploads :
2
# of downloads :
321
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Asia International Trading - Products & Specifications List.exe
Verdict:
No threats detected
Analysis date:
2022-11-01 13:20:06 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Сreating synchronization primitives
DNS request
Sending a custom TCP request
Launching a process
Creating a process with a hidden window
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
64 / 100
Signature
.NET source code contains potential unpacker
Encrypted powershell cmdline option found
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.Injuke
Status:
Malicious
First seen:
2022-11-01 03:10:51 UTC
File Type:
PE+ (.Net Exe)
Extracted files:
13
AV detection:
7 of 42 (16.67%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
collection persistence spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Adds Run key to start application
Checks computer location settings
Reads user/profile data of web browsers
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
57ade73fa55896090db5172300e4bfbd2667547843c6e278db4b16ad7cec4f15
MD5 hash:
74a13247008d2d71236d03958643e1ac
SHA1 hash:
c82f9de87c4975f747cd1bb0bf333551671b13f7
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments