MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 a2baea783b7929235c15f8b354fdb7a4dc5a251c97a0c3973cedd4eaa6dccf2a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
MassLogger
Vendor detections: 18
| SHA256 hash: | a2baea783b7929235c15f8b354fdb7a4dc5a251c97a0c3973cedd4eaa6dccf2a |
|---|---|
| SHA3-384 hash: | 49de2665848510a6a0f1a429d422c5ed825ce1f9562f9c5ad471a396a246af2b38f2596d93b89d40da05e08c919ff2d4 |
| SHA1 hash: | d44dd88b2e6e1627882ea8c7d89ca3b089439a09 |
| MD5 hash: | b224dae94650d2c68036ee7a9f52dc8f |
| humanhash: | seven-red-tennis-kentucky |
| File name: | SecuriteInfo.com.Win32.MalwareX-gen.96532335 |
| Download: | download sample |
| Signature | MassLogger |
| File size: | 759'808 bytes |
| First seen: | 2025-09-18 08:55:36 UTC |
| Last seen: | 2025-09-18 09:22:21 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'650 x AgentTesla, 19'462 x Formbook, 12'203 x SnakeKeylogger) |
| ssdeep | 12288:7khEAEZoOCgtOgYwNWPw+qecoOqlCuTjNt5d264+lqkdfGdQANfaMveBH/w:7WEAEZoOCgZ3NWPw+qePlHBdznlJdQQF |
| TLSH | T16DF4025523AAF902E1F25BB00CB0D6F417B8BE8DBC21D2065EE6EDEFB8347505951386 |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10522/11/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4504/4/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| Magika | pebin |
| Reporter | |
| Tags: | exe MassLogger |
Intelligence
File Origin
FRVendor Threat Intelligence
Result
Behaviour
Result
Behaviour
Malware Config
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | CP_AllMal_Detector |
|---|---|
| Author: | DiegoAnalytics |
| Description: | CrossPlatform All Malwares Detector: Detect PE, ELF, Mach-O, scripts, archives; overlay, obfuscation, encryption, spoofing, hiding, high entropy, network communication |
| Rule name: | crime_snake_keylogger |
|---|---|
| Author: | Rony (r0ny_123) |
| Description: | Detects Snake keylogger payload |
| Rule name: | DetectEncryptedVariants |
|---|---|
| Author: | Zinyth |
| Description: | Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded |
| Rule name: | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_DotNetProcHook |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables with potential process hoocking |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many email and collaboration clients. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_TelegramChatBot |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables using Telegram Chat Bot |
| Rule name: | MAL_Envrial_Jan18_1 |
|---|---|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects Encrial credential stealer malware |
| Reference: | https://twitter.com/malwrhunterteam/status/953313514629853184 |
| Rule name: | MAL_Envrial_Jan18_1_RID2D8C |
|---|---|
| Author: | Florian Roth |
| Description: | Detects Encrial credential stealer malware |
| Reference: | https://twitter.com/malwrhunterteam/status/953313514629853184 |
| Rule name: | masslogger_gcch |
|---|---|
| Author: | govcert_ch |
| Rule name: | matiex |
|---|---|
| Author: | Michelle Khalil |
| Description: | This rule detects unpacked matiex malware samples. |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | RANSOMWARE |
|---|---|
| Author: | ToroGuitar |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | Sus_CMD_Powershell_Usage |
|---|---|
| Author: | XiAnzheng |
| Description: | May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP) |
| Rule name: | telegram_bot_api |
|---|---|
| Author: | rectifyq |
| Description: | Detects file containing Telegram Bot API |
| Rule name: | Windows_Trojan_SnakeKeylogger_af3faa65 |
|---|---|
| Author: | Elastic Security |
| Rule name: | win_masslogger_w0 |
|---|---|
| Author: | govcert_ch |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.