MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 adb14c0c83cbf901a17a4995cf546bf803e4536d66491f750e21ed478692de5f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



a310Logger


Vendor detections: 12


Intelligence 12 IOCs YARA 2 File information Comments

SHA256 hash: adb14c0c83cbf901a17a4995cf546bf803e4536d66491f750e21ed478692de5f
SHA3-384 hash: 8cff312f5feb9cfd5b38f490516e9391741fafe8078fdf79a2b967d9b730423e4548f8999aff7e8f173bed8cd7df639a
SHA1 hash: 433ac28f0bd8c9125d9259a49cef355a5053ab4a
MD5 hash: 42ebee5400c47788993ec41139b85452
humanhash: vermont-avocado-nineteen-bacon
File name:42ebee5400c47788993ec41139b85452.exe
Download: download sample
Signature a310Logger
File size:1'189'376 bytes
First seen:2022-12-12 15:18:16 UTC
Last seen:2022-12-12 17:33:38 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'654 x AgentTesla, 19'464 x Formbook, 12'205 x SnakeKeylogger)
ssdeep 24576:cN51SWlJcgK6uobPLKb+DBr5cSttekNgy:cN5sNGbLDDR5F
Threatray 5'637 similar samples on MalwareBazaar
TLSH T18B45AD2CEBD8E579EFE7BAE206266FD01512E5C82F97F295883F71AD0D10210F106D96
TrID 63.0% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
11.2% (.SCR) Windows screen saver (13097/50/3)
9.0% (.EXE) Win64 Executable (generic) (10523/12/4)
5.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
3.8% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter abuse_ch
Tags:a310logger exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
183
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
42ebee5400c47788993ec41139b85452.exe
Verdict:
Suspicious activity
Analysis date:
2022-12-12 15:20:32 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Creating a file
Сreating synchronization primitives
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
DarkCloud
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Drops PE files to the user root directory
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Uses the Telegram API (likely for C&C communication)
Writes or reads registry keys via WMI
Yara detected AntiVM3
Yara detected DarkCloud
Yara detected Telegram RAT
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2022-12-12 15:19:08 UTC
File Type:
PE (.Net Exe)
Extracted files:
9
AV detection:
21 of 26 (80.77%)
Threat level:
  5/5
Result
Malware family:
darkcloud
Score:
  10/10
Tags:
family:darkcloud stealer
Behaviour
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
DarkCloud
Malware Config
C2 Extraction:
https://api.telegram.org/bot5987953548:AAHZugkL19YSU-VBmpZzqeKhFLxU01bNWe4/sendMessage?chat_id=5233665230
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
3b75425895af4ae3186b36277553641e37ca1d620ae18d68e40d13351b54de6a
MD5 hash:
94d1531b52774dce52a89e33646d5b1d
SHA1 hash:
29bf887b025b97bd7a9e1e261852ba824234a625
SH256 hash:
b39333b1f749829ad86608208a4f289c50a4f325da8212d89997560067e304ec
MD5 hash:
c8647e8724b8e25cd366a8339656807a
SHA1 hash:
cb8dbe311ed74125d2c0e6f5dd2481ce68e3f099
SH256 hash:
2d6f1067c58d82886db5c9dd72fb5e52d93ca39c61cb94aad3af0224f487102e
MD5 hash:
60cbc2cbb8ca660eb07c83ea9ef4c64b
SHA1 hash:
8c942cd8a5fc64308da7062c1fa5d5462d1231c1
SH256 hash:
922915132a628d0050bf03a473370544dde3323627fb4adcba3f1ba869537e50
MD5 hash:
1ecb63625d636b0b8f8ebdece9fa80c3
SHA1 hash:
5623d5ad21fc63893011bae7e4709c51219fcc1c
SH256 hash:
340ba2312d5cdfc3d89f3f35f627187dcb406e5afea134bc76b04f52f4285df3
MD5 hash:
85f9290aa8900e9fd74b01ee23125706
SHA1 hash:
310eb5e4aea5471b74a6385f1da283b9d8e3d698
SH256 hash:
60a969648ba94168d8165d66e2b0a4fc1eef5284ede13ccd3a30396ace5710e6
MD5 hash:
359335d006967ec5206698651d4a54df
SHA1 hash:
1dae6c1aae9db628bd9524f8145180c47a06dd2c
SH256 hash:
adb14c0c83cbf901a17a4995cf546bf803e4536d66491f750e21ed478692de5f
MD5 hash:
42ebee5400c47788993ec41139b85452
SHA1 hash:
433ac28f0bd8c9125d9259a49cef355a5053ab4a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

a310Logger

Executable exe adb14c0c83cbf901a17a4995cf546bf803e4536d66491f750e21ed478692de5f

(this sample)

  
Delivery method
Distributed via web download

Comments