MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 dbf19db7d0a4b842c4652e84edf70acbf1e1d2a9bd50403ba8fa0cd5abbba587. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



MassLogger


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: dbf19db7d0a4b842c4652e84edf70acbf1e1d2a9bd50403ba8fa0cd5abbba587
SHA3-384 hash: e4760e1c09ea2f91dc1404c436d72311d812d591595891f631096e9ab9811b2156b00b3c879df7915b1400b8c15d6c66
SHA1 hash: 3c7322a2cb6815c53eda6355d6dad0202e79bd8f
MD5 hash: 79df016414dd8f39209eddb093384ca6
humanhash: missouri-spaghetti-yellow-river
File name:LLLLLLLLLLL.exe
Download: download sample
Signature MassLogger
File size:1'164'800 bytes
First seen:2020-11-06 17:22:30 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 6cea15fcbfd6616496bbe80d9d9d0796 (26 x Loki, 25 x AgentTesla, 10 x ISRStealer)
ssdeep 24576:qVMHwG0ON514iuyWEpajnaK8VQ6RwaVFG:qVtGXrGi/hpajnaCUJG
Threatray 464 similar samples on MalwareBazaar
TLSH CA45CF2EADB14837C1233639DC0B5A689F36BF313924A9861BED3D0F5F396817425297
Reporter abuse_ch
Tags:exe MassLogger


Avatar
abuse_ch
Malspam distributing MassLogger:

From: "T. H. Khan" <ahsen.coskun@kuzeyboru.com.tr>
Reply-To: "Sale 1"<ahsen.coskun@kuzeyboru.com.tr>
Subject: Re:Purchase Order 17238502238 for Kasna Unit
Attachment: Purchase Order 17238502238 PDF.rar (contains "LLLLLLLLLLL.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
125
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Launching a process
Using the Windows Management Instrumentation requests
Creating a file
Unauthorized injection to a system process
Enabling autorun by creating a file
Deleting of the original file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
MassLogger RAT
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code references suspicious native API functions
Allocates memory in foreign processes
Contains functionality to detect sleep reduction / modifications
Delayed program exit found
Deletes itself after installation
Detected unpacking (changes PE section rights)
Detected unpacking (creates a PE file in dynamic memory)
Detected unpacking (overwrites its own PE header)
Drops VBS files to the startup folder
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for submitted file
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Queues an APC in another process (thread injection)
Sigma detected: Drops script at startup location
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
Yara detected AntiVM_3
Yara detected Costura Assembly Loader
Yara detected MassLogger RAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 310888 Sample: LLLLLLLLLLL.exe Startdate: 06/11/2020 Architecture: WINDOWS Score: 100 40 Malicious sample detected (through community Yara rule) 2->40 42 Multi AV Scanner detection for submitted file 2->42 44 Yara detected MassLogger RAT 2->44 46 7 other signatures 2->46 9 LLLLLLLLLLL.exe 2->9         started        12 wscript.exe 1 2->12         started        process3 signatures4 50 Detected unpacking (changes PE section rights) 9->50 52 Detected unpacking (creates a PE file in dynamic memory) 9->52 54 Detected unpacking (overwrites its own PE header) 9->54 56 6 other signatures 9->56 14 notepad.exe 1 9->14         started        17 LLLLLLLLLLL.exe 3 9->17         started        20 LLLLLLLLLLL.exe 12->20         started        process5 file6 58 Drops VBS files to the startup folder 14->58 60 Delayed program exit found 14->60 36 C:\Users\user\AppData\...\LLLLLLLLLLL.exe.log, ASCII 17->36 dropped 22 powershell.exe 18 17->22         started        62 Writes to foreign memory regions 20->62 64 Allocates memory in foreign processes 20->64 66 Maps a DLL or memory area into another process 20->66 25 notepad.exe 1 20->25         started        28 LLLLLLLLLLL.exe 2 20->28         started        signatures7 process8 file9 48 Deletes itself after installation 22->48 30 conhost.exe 22->30         started        38 C:\Users\user\AppData\...\LLLLLLLLLLLL.vbs, ASCII 25->38 dropped 32 powershell.exe 16 28->32         started        signatures10 process11 process12 34 conhost.exe 32->34         started       
Threat name:
Win32.Trojan.LokiBot
Status:
Malicious
First seen:
2020-11-06 19:02:46 UTC
AV detection:
27 of 29 (93.10%)
Threat level:
  5/5
Result
Malware family:
masslogger
Score:
  10/10
Tags:
family:masslogger spyware stealer upx
Behaviour
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Looks up external IP address via web service
Checks computer location settings
Deletes itself
Drops startup file
Reads user/profile data of web browsers
UPX packed file
MassLogger
MassLogger Main Payload
Unpacked files
SH256 hash:
dbf19db7d0a4b842c4652e84edf70acbf1e1d2a9bd50403ba8fa0cd5abbba587
MD5 hash:
79df016414dd8f39209eddb093384ca6
SHA1 hash:
3c7322a2cb6815c53eda6355d6dad0202e79bd8f
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

MassLogger

Executable exe dbf19db7d0a4b842c4652e84edf70acbf1e1d2a9bd50403ba8fa0cd5abbba587

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments