MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ed9b8b2727090a9a786fd014f3716eda74f0943e02c215c04c07613c3f271de9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



a310Logger


Vendor detections: 12


Intelligence 12 IOCs YARA 5 File information Comments

SHA256 hash: ed9b8b2727090a9a786fd014f3716eda74f0943e02c215c04c07613c3f271de9
SHA3-384 hash: 704d2b8b49990ad5d1710057f471bac91e62fc4b97c07e0b67df2040b0ec96f3daf97c0427f424181d5e6c63eeef2f54
SHA1 hash: a4f93b7a36b7584fe7ef3bc8e5f5e171a57933d5
MD5 hash: bc9e97f5f18b18824f0d7d4b57603f8d
humanhash: indigo-uncle-eight-wyoming
File name:SALARY RECEIPT.exe
Download: download sample
Signature a310Logger
File size:3'501'568 bytes
First seen:2023-03-09 14:31:09 UTC
Last seen:2023-03-09 16:30:31 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'740 x AgentTesla, 19'600 x Formbook, 12'241 x SnakeKeylogger)
ssdeep 49152:3YlX8PHUEni17exKgyLiTJVr3SEUnbMXS+q3C:3YlX8P
Threatray 90 similar samples on MalwareBazaar
TLSH T1AFF59E72BD57ED91D39B1B31C2DD06400FA89E537237C609B8C93246A5A2BE5DEC8273
TrID 63.0% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
11.2% (.SCR) Windows screen saver (13097/50/3)
9.0% (.EXE) Win64 Executable (generic) (10523/12/4)
5.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
3.8% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 00071a1b52522920 (18 x RemcosRAT, 4 x Formbook, 1 x AgentTesla)
Reporter James_inthe_box
Tags:a310logger exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
273
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
SALARY RECEIPT.exe
Verdict:
Malicious activity
Analysis date:
2023-03-09 14:32:41 UTC
Tags:
stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Launching a process
Creating a process with a hidden window
Creating a file in the %AppData% subdirectories
Unauthorized injection to a recently created process
Creating a file
Creating a window
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
BluStealer, ThunderFox Stealer, a310Logg
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Encrypted powershell cmdline option found
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
Yara detected a310Logger
Yara detected BluStealer
Yara detected Generic Downloader
Yara detected ThunderFox Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 823451 Sample: SALARY_RECEIPT.exe Startdate: 09/03/2023 Architecture: WINDOWS Score: 100 68 Malicious sample detected (through community Yara rule) 2->68 70 Multi AV Scanner detection for submitted file 2->70 72 Yara detected ThunderFox Stealer 2->72 74 6 other signatures 2->74 7 Aagaxjzofi.exe 4 2->7         started        10 SALARY_RECEIPT.exe 1 7 2->10         started        13 Aagaxjzofi.exe 3 2->13         started        process3 file4 76 Multi AV Scanner detection for dropped file 7->76 78 Machine Learning detection for dropped file 7->78 80 Encrypted powershell cmdline option found 7->80 15 Aagaxjzofi.exe 7->15         started        19 powershell.exe 7->19         started        44 C:\Users\user\AppData\...\Aagaxjzofi.exe, PE32 10->44 dropped 46 C:\Users\...\Aagaxjzofi.exe:Zone.Identifier, ASCII 10->46 dropped 48 C:\Users\user\...\SALARY_RECEIPT.exe.log, ASCII 10->48 dropped 82 Injects a PE file into a foreign processes 10->82 21 SALARY_RECEIPT.exe 1 7 10->21         started        23 powershell.exe 15 10->23         started        25 SALARY_RECEIPT.exe 10->25         started        27 SALARY_RECEIPT.exe 10->27         started        29 powershell.exe 13->29         started        31 Aagaxjzofi.exe 13->31         started        signatures5 process6 dnsIp7 54 Writes to foreign memory regions 15->54 56 Allocates memory in foreign processes 15->56 58 Tries to steal Crypto Currency Wallets 15->58 33 AppLaunch.exe 15->33         started        36 conhost.exe 19->36         started        50 api.telegram.org 149.154.167.220, 443, 49685, 49686 TELEGRAMRU United Kingdom 21->50 52 192.168.2.1 unknown unknown 21->52 60 Injects a PE file into a foreign processes 21->60 38 AppLaunch.exe 2 21->38         started        40 conhost.exe 23->40         started        42 conhost.exe 29->42         started        signatures8 process9 signatures10 62 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 33->62 64 Tries to steal Mail credentials (via file / registry access) 33->64 66 Tries to harvest and steal browser information (history, passwords, etc) 33->66
Threat name:
ByteCode-MSIL.Trojan.Tnega
Status:
Malicious
First seen:
2023-03-09 09:32:49 UTC
AV detection:
19 of 24 (79.17%)
Threat level:
  5/5
Result
Malware family:
blustealer
Score:
  10/10
Tags:
family:blustealer collection persistence spyware stealer
Behaviour
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks computer location settings
BluStealer
Malware Config
C2 Extraction:
https://api.telegram.org/bot5813496253:AAF4hamIx4-mNmFF1DwsqdJ4F9vUBmFqLo/sendMessage?chat_id=1105271645
Unpacked files
SH256 hash:
fc9bb9746aaa4e07944b2c1338d26ac852531a6e6c97e98f6a56202d27ff607c
MD5 hash:
d2ec533f8b40a8224d79c87c2291f943
SHA1 hash:
f305fa4c5c8525e853fbdbcf5c8cedad9ba08fd2
SH256 hash:
fb48d4a08f094d54cd4385e95e7fa23772231ae299e8b6610425d3877e66cd59
MD5 hash:
eb38025104cf044938078ed2d8383185
SHA1 hash:
e615f595961839e6685ee72bd810d38d1b401c96
SH256 hash:
ff8c24bce1eb009f0d5c47a09b96caf02726c285cea0d635082ad4da27e63d1b
MD5 hash:
9d6ec6072ee1814a4a01d1eb3fb67ba1
SHA1 hash:
d0b416de1c900b6bcb35dc182b2e8744f16c3289
SH256 hash:
9bcb8ea08c6c59381a3d1aee4064d6a52545f4ee4fed084c5fa10c482b2deb86
MD5 hash:
6659457a8cf6260e8e4383ee854320f3
SHA1 hash:
b9f92120feda118ac57001dff634d6d76d7cc53d
SH256 hash:
19165da6b6971fb51e8fb24ece61fc064200a3ba35c21431ca72a60b36598b6d
MD5 hash:
36d4e5194806b075b32c63e7aed202b0
SHA1 hash:
82eeb93115af15abca09cc053683cbac58d7b03c
SH256 hash:
d8ce7ff2abb608dc2ccb199e63e233b7ca54d4859e40abc78bacc7319dedd5b4
MD5 hash:
18bddb6bbe86b077b2fe2495256f75fd
SHA1 hash:
55c6e3161d0592c3eab8a2ffa36f575754722363
SH256 hash:
4ef5077398b5b5662ec3f5ca78f2e89d5023d31ab0191898caa86eb69b449af3
MD5 hash:
5bfde621233007919f23506640d426ea
SHA1 hash:
2cbcadcb2b07d0ef3ca5bad56886f1f699287e59
SH256 hash:
ed9b8b2727090a9a786fd014f3716eda74f0943e02c215c04c07613c3f271de9
MD5 hash:
bc9e97f5f18b18824f0d7d4b57603f8d
SHA1 hash:
a4f93b7a36b7584fe7ef3bc8e5f5e171a57933d5
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:INDICATOR_SUSPICIOUS_EXE_TelegramChatBot
Author:ditekSHen
Description:Detects executables using Telegram Chat Bot
Rule name:MALWARE_Win_A310Logger
Author:ditekSHen
Description:Detects A310Logger
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments