MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 a470b6f07644e28d40b1943e7bbbe82480904d0701165c21177a7e6a631f6db3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
a310Logger
Vendor detections: 18
| SHA256 hash: | a470b6f07644e28d40b1943e7bbbe82480904d0701165c21177a7e6a631f6db3 |
|---|---|
| SHA3-384 hash: | 0b27a2439223256a5eee3ab0f8bca85a7a6e4743c8cb3a7befd56b536d77a8c0e997c5fadeac3facf288595fbe95b20c |
| SHA1 hash: | a3d996d3fa8186fc9984618fd776b61d35890db2 |
| MD5 hash: | 5f056393ce31e9ee457335e28eb1c2c1 |
| humanhash: | south-grey-december-tennessee |
| File name: | a470b6f07644e28d40b1943e7bbbe82480904d0701165c21177a7e6a631f6db3 |
| Download: | download sample |
| Signature | a310Logger |
| File size: | 927'744 bytes |
| First seen: | 2025-10-10 06:46:24 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger) |
| ssdeep | 24576:Bv7wpfyIvZpUJQfIzEXDO6oSMpvkY5CTxvI+afHm:BvUgIHM4NotWxg+cHm |
| Threatray | 2'749 similar samples on MalwareBazaar |
| TLSH | T184151265279BEC07D9A10BB019B1E3B153387DCCE504D3126EFEACDBBC296952D8C252 |
| TrID | 69.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.0% (.EXE) Win64 Executable (generic) (10522/11/4) 6.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.2% (.EXE) Win32 Executable (generic) (4504/4/1) 1.9% (.EXE) Win16/32 Executable Delphi generic (2072/23) |
| Magika | pebin |
| Reporter | |
| Tags: | a310logger exe |
Intelligence
File Origin
HUVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Behaviour
Unpacked files
8e70ded796554c6b4cacde8469bfc6cfc13b4adecdaf0e0e22b8fcfab89c8f19
44d56ea314118afc4fa5fc409f4f1e4a8a232ff410de243c4fa14ada2365cae7
9aaec65c036d7b320fb31cbc73bff93e135eb2e8d3780c4a6dff2b4a5421ec9c
21cbafdad1d905516db91d5ea45b284e4167bdfb801701a95455ffa754b01dc9
789217599c1f3acfa58bde73eca30d4f0bd9c8184fdfe37ffa7339d321cfe266
741be14a5cfa6754257b0c372718ae5831353b6967164dcb7e95f163e5a3ece8
6a3b4e62a8262a0bf527ad8ea27eb19a0fcb48a76d6fc2868785362e40491432
7b7e52fb36207d89ab15876a165804032a70437b1eb56634ba58b548ce1eaada
377a51add880ac177698e183dc4184e9f5ff41bd10b0d306700004c47d35ae37
a470b6f07644e28d40b1943e7bbbe82480904d0701165c21177a7e6a631f6db3
377dc2241fff636854214a7c79f53d439c9ae85374604003d51a46ebb461fa9e
d58c12abba6d1d929cc2b5cfdd3e5df87e467319e33cc4e68b33a4a9476d0292
f49d6efeab5a163ccaff6d8166c0be80e8430d50b4ba7c43df903dbb05bb7bfa
e85bc42c7456e0a394fd3ce094d79efbc3fa74d9bda545d204d6f45e371bd713
d7911c750b95eda25760d99dbc911f231f831492be7f55ee2620c25e85d01dee
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | CP_AllMal_Detector |
|---|---|
| Author: | DiegoAnalytics |
| Description: | CrossPlatform All Malwares Detector: Detect PE, ELF, Mach-O, scripts, archives; overlay, obfuscation, encryption, spoofing, hiding, high entropy, network communication |
| Rule name: | DetectEncryptedVariants |
|---|---|
| Author: | Zinyth |
| Description: | Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded |
| Rule name: | FreddyBearDropper |
|---|---|
| Author: | Dwarozh Hoshiar |
| Description: | Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip. |
| Rule name: | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_CC_Regex |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing credit card regular expressions |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables containing SQL queries to confidential data stores. Observed in infostealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_TelegramChatBot |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables using Telegram Chat Bot |
| Rule name: | MALWARE_Win_A310Logger |
|---|---|
| Author: | ditekSHen |
| Description: | Detects A310Logger |
| Rule name: | MALWARE_Win_DarkCloud |
|---|---|
| Author: | ditekSHen |
| Description: | Detects DarkCloud infostealer |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | ProtectSharewareV11eCompservCMS |
|---|---|
| Author: | malware-lu |
| Rule name: | RIPEMD160_Constants |
|---|---|
| Author: | phoul (@phoul) |
| Description: | Look for RIPEMD-160 constants |
| Rule name: | SEH__vba |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | SHA1_Constants |
|---|---|
| Author: | phoul (@phoul) |
| Description: | Look for SHA1 constants |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | telegram_bot_api |
|---|---|
| Author: | rectifyq |
| Description: | Detects file containing Telegram Bot API |
| Rule name: | UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser |
|---|---|
| Author: | malware-lu |
| Rule name: | Windows_Trojan_DarkCloud_9905abce |
|---|---|
| Author: | Elastic Security |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.