MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 58c4af7a3c7c29a946743a87767b53963707e149c09f3a8846c01ca831e84b3d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



MassLogger


Vendor detections: 9


Intelligence 9 IOCs YARA 4 File information Comments

SHA256 hash: 58c4af7a3c7c29a946743a87767b53963707e149c09f3a8846c01ca831e84b3d
SHA3-384 hash: 685f6c164480bc4ba09cc9a9ac0d4bcd9edfc991df54ecefbeb3167835b116b750c4a6b03df46618c1a2d5ea5735794b
SHA1 hash: 16463ba1fd3cf7d27be85f35a5ac568066277f2f
MD5 hash: 1e2a95f0430902f259fb99ea0561eb30
humanhash: michigan-five-lake-nitrogen
File name:mazx.exe
Download: download sample
Signature MassLogger
File size:524'288 bytes
First seen:2020-11-24 16:54:20 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'749 x AgentTesla, 19'653 x Formbook, 12'246 x SnakeKeylogger)
ssdeep 12288:6Mz/hCsrxTdhJlyHC9ng7eLT+eXXvLXemFPtGGj:6MzZHrxTOWgKJnvdDGGj
Threatray 555 similar samples on MalwareBazaar
TLSH 5BB423056E94A45FC4FA97334DF1E1F10671978A7005CE0B798C6A8A3F3B3474946EA8
Reporter James_inthe_box
Tags:exe MassLogger

Intelligence


File Origin
# of uploads :
1
# of downloads :
201
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
Creating a file in the %AppData% subdirectories
Unauthorized injection to a recently created process
Creating a file
DNS request
Sending an HTTP GET request
Using the Windows Management Instrumentation requests
Launching a process
Reading critical registry keys
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Setting a global event handler for the keyboard
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
MassLogger RAT
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file access)
Yara detected Costura Assembly Loader
Yara detected MassLogger RAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 322214 Sample: mazx.exe Startdate: 24/11/2020 Architecture: WINDOWS Score: 100 52 Malicious sample detected (through community Yara rule) 2->52 54 Multi AV Scanner detection for dropped file 2->54 56 Multi AV Scanner detection for submitted file 2->56 58 9 other signatures 2->58 8 mazx.exe 1 6 2->8         started        12 noteped.exe 2 2->12         started        14 noteped.exe 3 2->14         started        process3 file4 34 C:\Users\user\AppData\Roaming\...\noteped.exe, PE32 8->34 dropped 36 C:\Users\user\...\noteped.exe:Zone.Identifier, ASCII 8->36 dropped 38 C:\Users\user\AppData\Local\...\mazx.exe.log, ASCII 8->38 dropped 60 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 8->60 16 mazx.exe 15 2 8->16         started        62 Injects a PE file into a foreign processes 12->62 20 noteped.exe 12->20         started        22 noteped.exe 12->22         started        24 noteped.exe 12->24         started        26 backgroundTaskHost.exe 12->26         started        28 noteped.exe 2 14->28         started        signatures5 process6 dnsIp7 40 elb097307-934924932.us-east-1.elb.amazonaws.com 23.21.42.25, 49736, 80 AMAZON-AESUS United States 16->40 42 nagano-19599.herokussl.com 16->42 44 api.ipify.org 16->44 46 Tries to steal Mail credentials (via file access) 16->46 48 Tries to harvest and steal browser information (history, passwords, etc) 16->48 50 Adds a directory exclusion to Windows Defender 16->50 30 powershell.exe 24 16->30         started        signatures8 process9 process10 32 conhost.exe 30->32         started       
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2020-11-24 04:30:05 UTC
File Type:
PE (.Net Exe)
Extracted files:
5
AV detection:
21 of 29 (72.41%)
Threat level:
  5/5
Result
Malware family:
masslogger
Score:
  10/10
Tags:
family:masslogger persistence spyware stealer
Behaviour
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Adds Run key to start application
Looks up external IP address via web service
Checks computer location settings
Reads user/profile data of web browsers
MassLogger
MassLogger Main Payload
Unpacked files
SH256 hash:
73ac29950ed503327c6c32d5263c41d770717bad3b50103fed70e43ac84c0d76
MD5 hash:
e25c23533de1bafd600f8749c389e767
SHA1 hash:
6249a9a5d9072bb1dce27da1f3813fedf99ad1b8
Detections:
win_masslogger_w0
SH256 hash:
83c08f0721c8b0c96e3d6a8f3ccaf5c96fbcc427d574625c34424c3429fefaa1
MD5 hash:
3c5dbcc3bb27e913e14efd8054811373
SHA1 hash:
b0eba9388abddaef9d5aa49ccd5dbab2924cced0
SH256 hash:
85e4f1eb477e335225254e6505b2c153a9f7baed02a88d05bdfa06842fd2ee34
MD5 hash:
72b9bc930ce21805702879b5a3ec4311
SHA1 hash:
bf0d2b7ac1b74337242efcb74c9ac1c48af6507a
SH256 hash:
58c4af7a3c7c29a946743a87767b53963707e149c09f3a8846c01ca831e84b3d
MD5 hash:
1e2a95f0430902f259fb99ea0561eb30
SHA1 hash:
16463ba1fd3cf7d27be85f35a5ac568066277f2f
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Keylog_bin_mem
Author:James_inthe_box
Description:Contains Keylog
Rule name:masslogger_gcch
Author:govcert_ch
Rule name:Quasar_RAT_1
Author:Florian Roth
Description:Detects Quasar RAT
Reference:https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf
Rule name:win_masslogger_w0
Author:govcert_ch

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments