MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 fc72b3ca2ae3fb65114b8c60e539aec25d8e0383204e7cda9794e8b66d2a098c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
MassLogger
Vendor detections: 17
| SHA256 hash: | fc72b3ca2ae3fb65114b8c60e539aec25d8e0383204e7cda9794e8b66d2a098c |
|---|---|
| SHA3-384 hash: | 9f10a8e9a18c418f8340a3559920bb5c0cb2e8d23b3601ca7df10016170a6681e657294b2482ed00c1fda9813fa399bf |
| SHA1 hash: | 344a2cbd3b00dfd51e5b6d52347f1a208e99a299 |
| MD5 hash: | 69512b80a72224061f217fdd6e585c26 |
| humanhash: | nuts-apart-nine-november |
| File name: | PROFORMA INVOICE.exe |
| Download: | download sample |
| Signature | MassLogger |
| File size: | 3'584'008 bytes |
| First seen: | 2026-02-19 14:44:43 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'818 x AgentTesla, 19'742 x Formbook, 12'286 x SnakeKeylogger) |
| ssdeep | 98304:g69N2OK16XR7KnIX7Idp13fJTbXes5/C0K1L/Uo2Tx+y:gBX1UROnE7IX13hTbXew/vKBglZ |
| Threatray | 36 similar samples on MalwareBazaar |
| TLSH | T144F533703690DF12D67023FA0571E2386B79AD6E7511C32ADEEBECE7B4A77810440A63 |
| TrID | 73.9% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 6.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 6.6% (.EXE) Win64 Executable (generic) (6522/11/2) 4.5% (.EXE) Win32 Executable (generic) (4504/4/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| Magika | pebin |
| Reporter | |
| Tags: | exe MassLogger |
Intelligence
File Origin
HUVendor Threat Intelligence
Details
Result
Behaviour
Result
Behaviour
Malware Config
Unpacked files
24b68cc56ca49a71fe5b439d0c765afe01552472c3793562519984803e8d1db7
479ca9e4974c18451cc33514037e524b1e04aea73d7ea1e2cec19ae5d443bb5d
5531654e84b8a3de3ce10423d12052f06db68e27805f874a1c4142bc27b0a37e
9e4efb8300d61fa29a18a9169965c531fc547234d3ced0532aa341f899801621
3c23073583bd33a068be551134983e7958884cb7656a4da03d9cc737b262f1ee
c9a7422e9bda1f8e36f23648857c16fe5332be73c474503b6502eccf4d5ed059
e37c838dc5eaa1b302ffbd8721c6a5f52a068e8f78bbec63b19b950462fe6cf8
fc72b3ca2ae3fb65114b8c60e539aec25d8e0383204e7cda9794e8b66d2a098c
9843f5987f4cc3ecb4dc341853be6549567da44e273162a36841020464cd9258
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | crime_snake_keylogger |
|---|---|
| Author: | Rony (r0ny_123) |
| Description: | Detects Snake keylogger payload |
| Rule name: | DetectEncryptedVariants |
|---|---|
| Author: | Zinyth |
| Description: | Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded |
| Rule name: | grakate_stealer_nov_2021 |
|---|
| Rule name: | INDICATOR_EXE_Packed_Fody |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables manipulated with Fody |
| Rule name: | INDICATOR_KB_CERT_7c1118cbbadc95da3752c46e47a27438 |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables signed with stolen, revoked or invalid certificates |
| Rule name: | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_DotNetProcHook |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables with potential process hoocking |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_TelegramChatBot |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables using Telegram Chat Bot |
| Rule name: | masslogger_gcch |
|---|---|
| Author: | govcert_ch |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | PE_Digital_Certificate |
|---|---|
| Author: | albertzsigovits |
| Rule name: | pe_imphash |
|---|
| Rule name: | RANSOMWARE |
|---|---|
| Author: | ToroGuitar |
| Rule name: | reverse_http |
|---|---|
| Author: | CD_R0M_ |
| Description: | Identify strings with http reversed (ptth) |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | Sus_CMD_Powershell_Usage |
|---|---|
| Author: | XiAnzheng |
| Description: | May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP) |
| Rule name: | telebot_framework |
|---|---|
| Author: | vietdx.mb |
| Rule name: | TelegramAPIMalware_PowerShell_EXE |
|---|---|
| Author: | @polygonben |
| Description: | Hunting for pwsh malware using Telegram for C2 |
| Rule name: | telegram_bot_api |
|---|---|
| Author: | rectifyq |
| Description: | Detects file containing Telegram Bot API |
| Rule name: | VIPKeyLogger |
|---|---|
| Author: | kevoreilly |
| Description: | Detects VIPKeyLogger Keylogger |
| Rule name: | Windows_Trojan_SnakeKeylogger_af3faa65 |
|---|---|
| Author: | Elastic Security |
| Rule name: | win_masslogger_w0 |
|---|---|
| Author: | govcert_ch |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.