MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 78cc69e2bac1d1082fdcd12ab9f73c8fbe177d4c77c3741a1f675afc19fde7df. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



MassLogger


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 78cc69e2bac1d1082fdcd12ab9f73c8fbe177d4c77c3741a1f675afc19fde7df
SHA3-384 hash: df9d18ace0555c519ed03452ca1f079e6bfc425a3b5eef39c685197aaeed7ccd0b1b38033a62c61611100fd5a308f70f
SHA1 hash: ae3cd291f2a022360896d4fae4f005f2b50a8364
MD5 hash: 0d89407b450dd157f3eac8a3a3850a07
humanhash: nitrogen-william-fanta-alanine
File name:SoapName.dll
Download: download sample
Signature MassLogger
File size:93'696 bytes
First seen:2021-01-07 15:09:45 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash dae02f32a21e03ce65412f6e56942daa (123 x YellowCockatoo, 60 x CobaltStrike, 44 x JanelaRAT)
ssdeep 1536:FsePiOhU+htr1bMLQxJQZpx3xtcQHbrjYXB55lov/Lp4zbhk1:l6OhU+/ragJ4px3xtcQnjcT5lMLp4JI
Threatray 793 similar samples on MalwareBazaar
TLSH 1693197B36E38A02D5585A7680A3112013F7D3CB3673D70E3E4852964F433EABA5ABD5
Reporter James_inthe_box
Tags:dll MassLogger

Intelligence


File Origin
# of uploads :
1
# of downloads :
138
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Creating a window
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
52 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
Binary contains a suspicious time stamp
Machine Learning detection for sample
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.Generic
Status:
Suspicious
First seen:
2021-01-07 15:09:41 UTC
File Type:
PE (.Net Dll)
Extracted files:
4
AV detection:
7 of 28 (25.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Unpacked files
SH256 hash:
78cc69e2bac1d1082fdcd12ab9f73c8fbe177d4c77c3741a1f675afc19fde7df
MD5 hash:
0d89407b450dd157f3eac8a3a3850a07
SHA1 hash:
ae3cd291f2a022360896d4fae4f005f2b50a8364
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments