MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 b50262bf6a9e901dacf870f4e693f0803901e6a6e7ea25008fd8114068f2011f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
404Keylogger
Vendor detections: 13
| SHA256 hash: | b50262bf6a9e901dacf870f4e693f0803901e6a6e7ea25008fd8114068f2011f |
|---|---|
| SHA3-384 hash: | b238a292e85b7925244e1b805d228776f5e2fca15ab4169ba867ffac8b58d1b7913bbfb5e4f8eeab717f8fed8f628f50 |
| SHA1 hash: | 77535ac6740f8b3dd93a0a5433b1dd4947da4a1c |
| MD5 hash: | 5319a6a100e21921d3339ede12a5031b |
| humanhash: | beer-stream-friend-mango |
| File name: | PO 25724 0021.exe |
| Download: | download sample |
| Signature | 404Keylogger |
| File size: | 781'312 bytes |
| First seen: | 2024-08-01 06:40:29 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 21371b611d91188d602926b15db6bd48 (70 x Formbook, 33 x AgentTesla, 20 x RemcosRAT) |
| ssdeep | 12288:DsHzOUNUSB/o5LsI1uwajJ5yvv1l2fdvnu8tIw7r23AD8BEh9ziYZweG3370aMU5:SiUmSB/o5d1ubcvYcic3HKUYuL0asub |
| Threatray | 5 similar samples on MalwareBazaar |
| TLSH | T15CF4233219E1ECA9C27063B5D8B6CED186A17870DE957FBB8B90F39FA430315C405B66 |
| TrID | 39.1% (.EXE) UPX compressed Win32 Executable (27066/9/6) 38.3% (.EXE) Win32 EXE Yoda's Crypter (26569/9/4) 7.2% (.EXE) Win16 NE executable (generic) (5038/12/1) 6.5% (.EXE) Win32 Executable (generic) (4504/4/1) 2.9% (.EXE) OS/2 Executable (generic) (2029/13) |
| File icon (PE): | |
| dhash icon | aae2f3e38383b629 (2'034 x Formbook, 1'183 x CredentialFlusher, 666 x AgentTesla) |
| Reporter | |
| Tags: | 404Keylogger exe |
Intelligence
File Origin
NLVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Unpacked files
8b799752acd2bad6565aa2560efd2d9fb3439428c8a50bbfb44749d476d286af
4d59b35375d85ca3dd06c76cedea67009a37075e179d0ae192b9412b24bec974
51fde361f93dc3702ed13354d064da8422188f3e1b06d9c9b04951da07d89cb8
ee4202466c3df1bb44773ee382d9814bf0daac585b416e44ab0eeefc7a588aaa
1a60823d2507bf095559dd725fcd7d87c20c98c61bab8c65551ad58892095909
b7eab5f19a05b4dc7dc0d210995778e5c74e0aac6e26c740e3a7593774c5d8bf
c75d0dd517c95d24288b71934a0bab7d6ede632eb13af2b142099c6667bf0a6e
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | pe_detect_tls_callbacks |
|---|
| Rule name: | UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser |
|---|---|
| Author: | malware-lu |
| Rule name: | upx_largefile |
|---|---|
| Author: | k3nr9 |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
| CHECK_NX | Missing Non-Executable Memory Protection | critical |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| AUTH_API | Manipulates User Authorization | ADVAPI32.dll::GetAce |
| MULTIMEDIA_API | Can Play Multimedia | WINMM.dll::timeGetTime |
| WIN_BASE_API | Uses Win Base API | KERNEL32.DLL::LoadLibraryA |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.