MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6731f235ff78e22e5a0f1503542926bb707a95251b8cbd22c56fbd7fc5a8cbbf. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



MassLogger


Vendor detections: 15


Intelligence 15 IOCs YARA 15 File information Comments

SHA256 hash: 6731f235ff78e22e5a0f1503542926bb707a95251b8cbd22c56fbd7fc5a8cbbf
SHA3-384 hash: dfe61a8790df8d981c13c2269b889d15a566b87a2527782da5974522a177a9412dea6cb88e52013781d2a8eed0b9cbea
SHA1 hash: eb68218c1d70f3ba00f8190c8171ad1cfa2fb42a
MD5 hash: 45061e4da841c2587d0890148705a142
humanhash: ten-oklahoma-potato-kilo
File name:45061e4da841c2587d0890148705a142.exe
Download: download sample
Signature MassLogger
File size:416'083 bytes
First seen:2022-08-05 06:53:36 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 98f67c550a7da65513e63ffd998f6b2e (6 x AgentTesla, 6 x MassLogger, 4 x CoinMiner)
ssdeep 6144:UvEN2U+T6i5LirrllHy4HUcMQY61DdreIfa:GENN+T5xYrllrU7QY61ra
TLSH T1A3946D6AFB64321AF577D6F0692792697B397D321F629C5F92C06B082474213B2B031F
TrID 58.8% (.EXE) Win32 Executable Microsoft Visual Basic 6 (82067/2/8)
22.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
7.5% (.EXE) Win64 Executable (generic) (10523/12/4)
3.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
3.2% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 20047c7c60e0e002 (5 x MassLogger, 2 x Neshta)
Reporter @abuse_ch
Tags:exe MassLogger

Intelligence


File Origin
# of uploads :
1
# of downloads :
226
Origin country :
NL NL
Mail intelligence
No data
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
45061e4da841c2587d0890148705a142.exe
Verdict:
Malicious activity
Analysis date:
2022-08-05 06:58:00 UTC
Tags:
evasion stealer quasar

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
–°reating synchronization primitives
Creating a window
Creating a file
Creating a process from a recently created file
Creating a process with a hidden window
Creating a file in the Windows subdirectories
Enabling the 'hidden' option for recently created files
Launching a process
Setting a keyboard event handler
Setting a global event handler
Creating a file in the %AppData% directory
Using the Windows Management Instrumentation requests
DNS request
Sending an HTTP GET request
Reading critical registry keys
Setting a single autorun event
Launching the process to create tasks for the scheduler
Stealing user critical data
Unauthorized injection to a system process
Enabling autorun
Enabling a "Do not show hidden files" option
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
coinminer greyware keylogger overlay shell32.dll siggen6 swisyn virus
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
CryptOne, BluStealer, StormKitty
Detection:
malicious
Classification:
rans.troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Changes security center settings (notifications, updates, antivirus, firewall)
Creates an undocumented autostart registry key
Detected CryptOne packer
Drops executables to the windows directory (C:\Windows) and starts them
Drops PE files with benign system names
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Potential malicious icon found
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected BluStealer
Yara detected Generic Downloader
Yara detected StormKitty Stealer
Yara detected Telegram RAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 679096 Sample: Lg3gn9y1Cj.exe Startdate: 05/08/2022 Architecture: WINDOWS Score: 100 93 Potential malicious icon found 2->93 95 Malicious sample detected (through community Yara rule) 2->95 97 Antivirus detection for dropped file 2->97 99 10 other signatures 2->99 11 Lg3gn9y1Cj.exe 1 4 2->11         started        15 explorer.exe 2->15         started        17 svchost.exe 2->17         started        19 8 other processes 2->19 process3 dnsIp4 71 C:\Users\user\Desktop\lg3gn9y1cj.exe, PE32 11->71 dropped 73 C:\Users\user\AppData\Local\icsys.icn.exe, PE32 11->73 dropped 131 Installs a global keyboard hook 11->131 22 icsys.icn.exe 3 11->22         started        27 lg3gn9y1cj.exe 1 11->27         started        133 Changes security center settings (notifications, updates, antivirus, firewall) 17->133 79 127.0.0.1 unknown unknown 19->79 file5 signatures6 process7 dnsIp8 81 192.168.2.1 unknown unknown 22->81 67 C:\Windows\System\explorer.exe, PE32 22->67 dropped 109 Antivirus detection for dropped file 22->109 111 Machine Learning detection for dropped file 22->111 113 Drops executables to the windows directory (C:\Windows) and starts them 22->113 121 2 other signatures 22->121 29 explorer.exe 3 20 22->29         started        115 Writes to foreign memory regions 27->115 117 Allocates memory in foreign processes 27->117 119 Injects a PE file into a foreign processes 27->119 34 AppLaunch.exe 15 3 27->34         started        file9 signatures10 process11 dnsIp12 83 vccmd01.zxq.net 51.81.194.202, 443, 49764, 49766 OVHFR United States 29->83 85 zxq.net 29->85 91 5 other IPs or domains 29->91 75 C:\Windows\System\spoolsv.exe, PE32 29->75 dropped 77 C:\Users\user\AppData\Roaming\mrsys.exe, PE32 29->77 dropped 137 Antivirus detection for dropped file 29->137 139 System process connects to network (likely due to code injection or exploit) 29->139 141 Creates an undocumented autostart registry key 29->141 149 3 other signatures 29->149 36 spoolsv.exe 2 29->36         started        87 icanhazip.com 104.18.114.97, 49753, 80 CLOUDFLARENETUS United States 34->87 89 64.89.4.0.in-addr.arpa 34->89 143 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 34->143 145 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 34->145 147 May check the online IP address of the machine 34->147 151 2 other signatures 34->151 file13 signatures14 process15 file16 65 C:\Windows\System\svchost.exe, PE32 36->65 dropped 101 Antivirus detection for dropped file 36->101 103 Machine Learning detection for dropped file 36->103 105 Drops executables to the windows directory (C:\Windows) and starts them 36->105 107 2 other signatures 36->107 40 svchost.exe 3 4 36->40         started        signatures17 process18 file19 69 C:\Users\user\AppData\Local\stsys.exe, PE32 40->69 dropped 123 Antivirus detection for dropped file 40->123 125 Detected CryptOne packer 40->125 127 Machine Learning detection for dropped file 40->127 129 3 other signatures 40->129 44 spoolsv.exe 40->44         started        47 at.exe 40->47         started        49 at.exe 40->49         started        51 17 other processes 40->51 signatures20 process21 signatures22 135 Installs a global keyboard hook 44->135 53 conhost.exe 47->53         started        55 conhost.exe 49->55         started        57 conhost.exe 51->57         started        59 conhost.exe 51->59         started        61 conhost.exe 51->61         started        63 13 other processes 51->63 process23
Threat name:
Win32.Trojan.Swisyn
Status:
Malicious
First seen:
2022-08-04 17:51:03 UTC
File Type:
PE (Exe)
Extracted files:
9
AV detection:
37 of 38 (97.37%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
stormkitty
Score:
  10/10
Tags:
family:blustealer family:stormkitty collection evasion persistence stealer
Behaviour
Checks processor information in registry
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Enumerates physical storage devices
Drops file in Windows directory
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Adds Run key to start application
Looks up external IP address via web service
Loads dropped DLL
Executes dropped EXE
Modifies Installed Components in the registry
BluStealer
Modifies WinLogon for persistence
Modifies visiblity of hidden/system files in Explorer
StormKitty
StormKitty payload
Unpacked files
SH256 hash:
c213005d8dbb7ad6b40effbd651f32b05efc48bfffd470c64389f536826dde8c
MD5 hash:
554d8a35de804b5f43da29e1124bff4e
SHA1 hash:
5d2ca141e18868d0abfa58e5ea54260e702530c6
SH256 hash:
6731f235ff78e22e5a0f1503542926bb707a95251b8cbd22c56fbd7fc5a8cbbf
MD5 hash:
45061e4da841c2587d0890148705a142
SHA1 hash:
eb68218c1d70f3ba00f8190c8171ad1cfa2fb42a

YARA Signatures


MalareBazaar uses YARA rules from several public and non-public repositories, such as Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious proccess dumps they may create. Please note that only results from TLP:WHITE rules are being displayeyd.

Rule name:INDICATOR_SUSPICIOUS_Binary_References_Browsers
Author:ditekSHen
Description:Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
Rule name:INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store
Author:ditekSHen
Description:Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients
Author:ditekSHen
Description:Detects executables referencing many email and collaboration clients. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_TelegramChatBot
Author:ditekSHen
Description:Detects executables using Telegram Chat Bot
Rule name:malware_Agenttesla_type2
Author:JPCERT/CC Incident Response Group
Description:detect Agenttesla in memory
Reference:internal research
Rule name:MALWARE_Win_A310Logger
Author:ditekSHen
Description:Detects A310Logger
Rule name:MALWARE_Win_StormKitty
Author:ditekSHen
Description:Detects StormKitty infostealer
Rule name:masslogger_gcch
Author:govcert_ch
Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB
Rule name:pe_imphash
Rule name:Quasar_RAT_1
Author:Florian Roth
Description:Detects Quasar RAT
Reference:https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf
Rule name:Quasar_RAT_1_RID2B54
Author:Florian Roth
Description:Detects Quasar RAT
Reference:https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:SUSP_DOTNET_PE_List_AV
Author:SECUINFRA Falcon Team
Description:Detecs .NET Binary that lists installed AVs
Rule name:win_masslogger_w0
Author:govcert_ch

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments