MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e739497b1c69f1e08ba35b2e27c5b60d8205b14a1c7456166c96463fdea6c3aa. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



OnlyLogger


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: e739497b1c69f1e08ba35b2e27c5b60d8205b14a1c7456166c96463fdea6c3aa
SHA3-384 hash: 0af3854e71f6a6877efea142de678f863c5c554382326642e4e2e0e5baeab4f581c06a1905081a4aa93273f680f3e615
SHA1 hash: e834323fd29afee6da96359973e696d2447cd02e
MD5 hash: a388fcaba9a63877f5fc46f39b3917ec
humanhash: mexico-alpha-glucose-montana
File name:a388fcaba9a63877f5fc46f39b3917ec.exe
Download: download sample
Signature OnlyLogger
File size:412'160 bytes
First seen:2022-01-12 07:22:01 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash d9430a21caf8f698e2680c3051417cb9 (2 x Smoke Loader, 1 x ArkeiStealer, 1 x DanaBot)
ssdeep 6144:oVy5Ly86oWurRtVmW1CG70b0fgyZjsxe7FUwZm+wD:1mGWu9twWEGY0fgypSe7FUwZ
TLSH T1B494E0127B91C936D2E26A344C34EBA15F7F79A22670D746B3942BDE6F732D01829343
File icon (PE):PE icon
dhash icon 3261dcbc64dcf166 (1 x OnlyLogger)
Reporter abuse_ch
Tags:exe OnlyLogger

Intelligence


File Origin
# of uploads :
1
# of downloads :
185
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
a388fcaba9a63877f5fc46f39b3917ec.exe
Verdict:
Suspicious activity
Analysis date:
2022-01-12 08:12:16 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Searching for synchronization primitives
Сreating synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Sending a custom TCP request
DNS request
Running batch commands
Creating a process with a hidden window
Launching a tool to kill processes
Gathering data
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
onlyLogger
Detection:
malicious
Classification:
troj.evad
Score:
68 / 100
Signature
Antivirus / Scanner detection for submitted sample
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Yara detected onlyLogger
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Azorult
Status:
Malicious
First seen:
2022-01-08 20:53:52 UTC
File Type:
PE (Exe)
Extracted files:
24
AV detection:
36 of 42 (85.71%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Kills process with taskkill
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Deletes itself
Unpacked files
SH256 hash:
012c3d22b5374c4f595fcf1986bf2a67697f322f36e8bb6456809334f98f5781
MD5 hash:
8bacb64db8fb73308faefd14b863fd43
SHA1 hash:
c5bf54f8b9cc198d6d380f3ee7a74df2feadf32a
SH256 hash:
e739497b1c69f1e08ba35b2e27c5b60d8205b14a1c7456166c96463fdea6c3aa
MD5 hash:
a388fcaba9a63877f5fc46f39b3917ec
SHA1 hash:
e834323fd29afee6da96359973e696d2447cd02e
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments