MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 be9a6afa48295143f7ad35badc92bf886caa1b714689ea97ea1ec45bbea3cd6d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
MassLogger
Vendor detections: 15
| SHA256 hash: | be9a6afa48295143f7ad35badc92bf886caa1b714689ea97ea1ec45bbea3cd6d |
|---|---|
| SHA3-384 hash: | a0fd90c6bafd469f71035d49063abc8130894c421e2b89a7136f626fceb097fae72e44f2580db11048b10a432c75c82e |
| SHA1 hash: | 92f978b4747f9d5d159640b5a3bdaa17c2e880d4 |
| MD5 hash: | 94f37a8102d932fe3cd42aba6dd42a05 |
| humanhash: | sink-paris-california-summer |
| File name: | 890098765456465.exe |
| Download: | download sample |
| Signature | MassLogger |
| File size: | 647'168 bytes |
| First seen: | 2026-05-20 18:10:38 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'991 x AgentTesla, 19'899 x Formbook, 12'331 x SnakeKeylogger) |
| ssdeep | 12288:tl8SwYmvIb18ZRlhdIu/bQHg0jpPDbFswDp:yfZRlhl/UVNFB |
| TLSH | T174D4BE8877D54660D5BE6E78853606581731FE0B8EB7EB1E0E88B0FA1E737818C117A3 |
| TrID | 73.9% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 6.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 6.6% (.EXE) Win64 Executable (generic) (6522/11/2) 4.5% (.EXE) Win32 Executable (generic) (4504/4/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| Magika | pebin |
| dhash icon | d4c8dcccccd4dcd4 (2 x RemcosRAT, 1 x AveMariaRAT, 1 x Formbook) |
| Reporter | |
| Tags: | exe MassLogger |
Intelligence
File Origin
CHVendor Threat Intelligence
Result
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | DetectEncryptedVariants |
|---|---|
| Author: | Zinyth |
| Description: | Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | Sus_CMD_Powershell_Usage |
|---|---|
| Author: | XiAnzheng |
| Description: | May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP) |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.