MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 dd09be82abbdebe05d7531fd1113727857b11374801dfcb98019f725651130ca. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
MassLogger
Vendor detections: 15
| SHA256 hash: | dd09be82abbdebe05d7531fd1113727857b11374801dfcb98019f725651130ca |
|---|---|
| SHA3-384 hash: | a98d1c9be935160bf340d830da520eefd6c82ec46d53f25faff0988ecb5bf1f96f2fc49ec08430ca93bc0755fdba96dd |
| SHA1 hash: | a4d88d8efdab295527096b93f42bf07337b2c46f |
| MD5 hash: | c2f2845cb7ab45f06eefdd8d1b19dd0a |
| humanhash: | william-vermont-happy-sierra |
| File name: | dd09be82abbdebe05d7531fd1113727857b11374801dfcb98019f725651130ca |
| Download: | download sample |
| Signature | MassLogger |
| File size: | 477'184 bytes |
| First seen: | 2025-05-09 14:46:21 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | ef471c0edf1877cd5a881a6a8bf647b9 (74 x Formbook, 33 x Loki, 29 x Loda) |
| ssdeep | 12288:rOv5jKhsfoPA+yeVKUCUxP4C902bdRtJJPiDI1GqIVeT:rq5TfcdHj4fmbZ1G6 |
| Threatray | 2'153 similar samples on MalwareBazaar |
| TLSH | T1C9A41261B36CCCB6F9112536E0BADBF10925CE5289C9038B5BDDBE837C722111AF16E5 |
| TrID | 39.1% (.EXE) UPX compressed Win32 Executable (27066/9/6) 38.3% (.EXE) Win32 EXE Yoda's Crypter (26569/9/4) 7.2% (.EXE) Win16 NE executable (generic) (5038/12/1) 6.5% (.EXE) Win32 Executable (generic) (4504/4/1) 2.9% (.EXE) OS/2 Executable (generic) (2029/13) |
| Magika | pebin |
| dhash icon | 34fcf0d4dcf0d2cc (5 x GuLoader, 4 x MassLogger, 4 x VIPKeylogger) |
| Reporter | |
| Tags: | exe MassLogger |
Intelligence
File Origin
HUVendor Threat Intelligence
Result
Behaviour
Result
Signature
Behaviour
Result
Behaviour
Unpacked files
dd09be82abbdebe05d7531fd1113727857b11374801dfcb98019f725651130ca
9626576751f3bb699691a8b760b018914957fe19c7af62067db8b4a4aa69c43c
5a3d534974b9eb9a059ff4296492f2c780062b241ba12268b272d36c1b29d68d
9ed10038d2b1b7f16aa554d6d142f934512e6a875567669ea947a5e5cddb8ecd
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | crime_snake_keylogger |
|---|---|
| Author: | Rony (r0ny_123) |
| Description: | Detects Snake keylogger payload |
| Rule name: | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_TelegramChatBot |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables using Telegram Chat Bot |
| Rule name: | MAL_Envrial_Jan18_1 |
|---|---|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects Encrial credential stealer malware |
| Reference: | https://twitter.com/malwrhunterteam/status/953313514629853184 |
| Rule name: | MAL_Envrial_Jan18_1_RID2D8C |
|---|---|
| Author: | Florian Roth |
| Description: | Detects Encrial credential stealer malware |
| Reference: | https://twitter.com/malwrhunterteam/status/953313514629853184 |
| Rule name: | masslogger_gcch |
|---|---|
| Author: | govcert_ch |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | RANSOMWARE |
|---|---|
| Author: | ToroGuitar |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | Sus_Obf_Enc_Spoof_Hide_PE |
|---|---|
| Author: | XiAnzheng |
| Description: | Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP) |
| Rule name: | telegram_bot_api |
|---|---|
| Author: | rectifyq |
| Description: | Detects file containing Telegram Bot API |
| Rule name: | UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser |
|---|---|
| Author: | malware-lu |
| Rule name: | upx_largefile |
|---|---|
| Author: | k3nr9 |
| Rule name: | Windows_Trojan_SnakeKeylogger_af3faa65 |
|---|---|
| Author: | Elastic Security |
| Rule name: | win_masslogger_w0 |
|---|---|
| Author: | govcert_ch |
| Rule name: | win_upx_packed |
|---|---|
| Author: | Reedus0 |
| Description: | Rule for detecting UPX packed malware |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
| CHECK_NX | Missing Non-Executable Memory Protection | critical |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| MULTIMEDIA_API | Can Play Multimedia | WINMM.dll::timeGetTime |
| SECURITY_BASE_API | Uses Security Base API | ADVAPI32.dll::AddAce |
| WIN_BASE_API | Uses Win Base API | KERNEL32.DLL::LoadLibraryA |
| WIN_NETWORK_API | Supports Windows Networking | MPR.dll::WNetUseConnectionW |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.