MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 feaafc430cbfc58b0c01d2ac3fe9e65004dfd1134b91134affe10ac1e58653de. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



MassLogger


Vendor detections: 11


Intelligence 11 IOCs YARA 3 File information Comments

SHA256 hash: feaafc430cbfc58b0c01d2ac3fe9e65004dfd1134b91134affe10ac1e58653de
SHA3-384 hash: a94c1d19f379da0d2e780c1654454a75b17c37a2b33432ab4006dbf669c6521a32ef0f6bd5b305c70231c34377eaed0f
SHA1 hash: 9b10943eaedf676a6008672a7f58b0d8b1abc4a4
MD5 hash: 63a64a7f78e3f7b04c52808c6413c538
humanhash: black-beer-nevada-eight
File name:feaafc430cbfc58b0c01d2ac3fe9e65004dfd1134b91134affe10ac1e58653de.ps1
Download: download sample
Signature MassLogger
File size:1'536'030 bytes
First seen:2025-09-24 12:19:36 UTC
Last seen:Never
File type:PowerShell (PS) ps1
MIME type:text/plain
ssdeep 24576:syiPtSGxNXxr2lEwI+H58WZOLvmebzwGj1hTZAgu3sy43hUW:0JXxSyUXZihhE3slht
TLSH T179659E3A3D011855AD1D0FB7B4B346289EC468EC47DC6FE4903AA97827C4D6E7AC42B7
Magika powershell
Reporter JAMESWT_WT
Tags:45-141-87-195 MassLogger ps1 Telegram

Intelligence


File Origin
# of uploads :
1
# of downloads :
113
Origin country :
IT IT
Vendor Threat Intelligence
Verdict:
Malicious
Score:
90.2%
Tags:
emotet virus shell spawn
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
base64 obfuscated
Verdict:
Malicious
File Type:
unix shell
First seen:
2025-07-28T07:15:00Z UTC
Last seen:
2025-07-28T07:15:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan.Script.Generic
Gathering data
Threat name:
Script-PowerShell.Trojan.DonutLoader
Status:
Malicious
First seen:
2025-07-22 04:33:20 UTC
File Type:
Text
AV detection:
11 of 38 (28.95%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
novastealer donut_injector
Similar samples:
Result
Malware family:
masslogger
Score:
  10/10
Tags:
family:donutloader family:masslogger collection execution loader spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Command and Scripting Interpreter: PowerShell
Accesses Microsoft Outlook profiles
Looks up external IP address via web service
Executes dropped EXE
Badlisted process makes network request
Detects DonutLoader
DonutLoader
Donutloader family
MassLogger
Masslogger family
Malware Config
C2 Extraction:
https://api.telegram.org/bot7977386475:AAHfiLgStvqfQQTGWQ4wZqXfd9MAdSI1RVI/sendMessage?chat_id=1149967757
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:botnet_plaintext_c2
Author:cip
Description:Attempts to match at least some of the strings used in some botnet variants which use plaintext communication protocols.
Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments