MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 6d6224681c25a1b844d3cb183b6f852af8724c0cb25815aaf9e50ff00a6fddcf. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
MassLogger
Vendor detections: 9
SHA256 hash: | 6d6224681c25a1b844d3cb183b6f852af8724c0cb25815aaf9e50ff00a6fddcf |
---|---|
SHA3-384 hash: | fc0c36a4149c8caa03f4263528c6799d7c6a734ae2a000e15a83debffebbfd2b29edcb47d47bc98f5b457127ad2cec2b |
SHA1 hash: | a9ee4ebe7c0d1071dba183287c2b5443b01af792 |
MD5 hash: | 32b8a98b6b3db245201d0b91a8d0a200 |
humanhash: | india-salami-november-mountain |
File name: | assembly |
Download: | download sample |
Signature | MassLogger |
File size: | 725'504 bytes |
First seen: | 2020-08-26 08:32:42 UTC |
Last seen: | Never |
File type: | ![]() |
MIME type: | application/x-dosexec |
imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (28'877 x AgentTesla, 8'705 x Formbook, 4'202 x Loki) |
ssdeep | 12288:NqzbqrJonXSEWK93bW2VpajKop0S7i/hy6Q5f3tQI852RRfr6hzw:AbYJEzBR6KoppYY6q22RRfrV |
Threatray | 997 similar samples on MalwareBazaar |
TLSH | F8F402EE12EC6B5EDC0F5C34987F53B262A2B0442AC2D88BEBF419D616D0F069543C9C |
Reporter | @Libranalysis |
Tags: | Dotnet Loader MassLogger ReZer0v4 |

@Libranalysis
A detailed analysis is available at: https://maxkersten.nl/binary-analysis-course/malware-analysis/rezer0v4-loader/Intelligence
File Origin
# of uploads :
1
# of downloads :
107
Origin country :

Mail intelligence
No data
Vendor Threat Intelligence
Detection:
Ispy
Detection(s):
Result
Verdict:
Malware
Maliciousness:
Behaviour
Sending a UDP request
Creating a file in the %AppData% directory
Creating a file in the %temp% directory
Launching a process
Creating a process with a hidden window
Deleting a recently created file
Unauthorized injection to a recently created process
Using the Windows Management Instrumentation requests
Creating a file
Running batch commands
Enabling autorun by creating a file
Deleting of the original file
Result
Threat name:
MassLogger RAT
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Scheduled temp file as task from temp location
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Yara detected MassLogger RAT
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Infostealer.Agentesla
Status:
Malicious
First seen:
2020-08-26 08:34:07 UTC
File Type:
PE (.Net Exe)
Extracted files:
3
AV detection:
21 of 27 (77.78%)
Threat level:
5/5
Detection(s):
Malicious file
Verdict:
malicious
Similar samples:
+ 987 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
9/10
Tags:
rezer0
Behaviour
rezer0
AV coverage:
50.75%
AV detections:
34 / 67
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Dropping
MassLogger
Comments
Login required
You need to login to in order to write a comment. Login with your Twitter account.