Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now

MassLogger

75
Global rank
71 infographic chevron month
Month rank
90 infographic chevron week
Week rank
0
IOCs

MassLogger is a credential stealer and keylogger first identified in April 2020. It has been actively used in cyber campaigns to exfiltrate sensitive information from compromised systems. It is designed for easy use by less tech-savvy actors and is prominent for the capability of spreading via USB drives. It targets both individuals and organizations in various industries, mostly in Europe and the USA.

Keylogger
Type
Unknown
Origin
4 January, 2020
First seen
24 April, 2025
Last seen

How to analyze MassLogger with ANY.RUN

Type
Unknown
Origin
4 January, 2020
First seen
24 April, 2025
Last seen

IOCs

IP addresses
46.246.4.5
202.172.25.11
47.106.186.21
183.81.164.154
47.115.6.72
141.136.34.78
94.127.7.174
188.121.43.27
185.106.92.64
195.85.115.195
203.170.129.7
149.248.76.158
162.221.185.10
51.68.11.192
85.187.128.28
144.91.112.76
91.196.124.59
94.126.169.122
185.31.121.136
67.215.233.8
Domains
mail.apexpharmabd.com
mail.miniorangeman.com
mail.ujexchange.com
mail.qsealagri.com
mail.cl-logistics.vn
mail.multisecure.co.id
mail.hhpfresh.com
mail.starofseasmarine.com
mail.zoomlogistics-bd.com
mail.wwaluminum.com
gator3220.hostgator.com
mail.aryanelectricals.in
mail.azenet.az
mail.mpsv-hnz-k.ba
mail.safetylinedxb.ae
mail.supamemo.sbs
mail.bouttases.fr
mail.siltasmermer.com
inv3stwithus.com
mail.bethesdakindergarten.com
Last Seen at

Recent blog posts

post image
How Threat Intelligence Feeds Help During Inc...
watchers 678
comments 0
post image
PE32 Ransomware: A New Telegram-Based Threat...
watchers 3484
comments 0
post image
Seamlessly Integrate ANY.RUN’s Services into...
watchers 531
comments 0

What is MassLogger malware?

MassLogger is a sophisticated .NET-based malware classified as a credential stealer and keylogger observed from April 2020. It has since evolved with regular updates from its creator, known as NYANxCAT, who is also linked to other malware like LimeRAT and AsyncRAT.

Its high configurability, evasion techniques, and broad targeting capabilities, as well as the price of approximately $100, made it a popular item on dark web forums. It affects both individual users and organizations, with campaigns targeting industries like manufacturing, banking, and logistics across regions such as Europe (Turkey, Latvia, Italy, etc.), the U.S., and beyond.

MassLogger typically infiltrates networks through social engineering tactics, most often via phishing emails. They may target business users and masquerade as legitimate correspondence, such as procurement requests, shipping notices (e.g., referencing companies like Maersk), or other professional communications.

It can also spread via USB drives by injecting itself into files, infecting new systems when those files are opened.

In some campaigns, MassLogger has been distributed via compiled HTML files (.chm), which, when opened, execute embedded JavaScript to initiate the infection chain.

The infection chain is often multi-staged, involving scripting languages like PowerShell and .NET assemblies, making it harder to trace back to the initial vector.

TTPs of MassLogger attacks MassLogger tactics and techniques via MITRE ATT&CK Matrix

MassLogger is highly efficient at collecting and exfiltrating data. It extracts credentials from a wide range of applications, including web browsers (Chrome, Firefox, Edge), email clients (Outlook, Thunderbird, Foxmail), messaging apps (Discord, Telegram, Pidgin), VPN services (NordVPN), and FTP clients (FileZilla). It can also extract cryptocurrency wallet data.

Besides, it engages keylogging, clipboard monitoring, screen capturing, gathering system info via WMI queries.

Get started today for free

Analyze malware and phishing in a fully-interactive sandbox

Create free account

MassLogger Stealer’s prominent features

  • Abuses USB drives to infiltrate systems via infected files
  • To faster achieve its goals and avoid detection, can work without persistence mechanisms
  • Extracts data from a wide range of apps, including browsers, messengers, VPNs, network clients etc.
  • Available as a Malware-as-a-Service (MaaS) tool for $100 which amplifies its reach
  • The focus on fresh session cookies and 2FA bypass (via anti-detect browsers) heightens its threat to modern authentication systems.

MassLogger execution process and technical details

All the variety of MassLogger’s vicious ways is illustrated by fresh malware samples and analyses in ANY.RUN’s Interactive Sandbox. Let’s view one of the recent analysis sessions.

See MassLogger’s sample in action

The intrusion often begins with a phishing email containing a malicious attachment — typically a RAR-compressed archive with an unusual filename extension, such as .chm or .pif — used to bypass email filters. In the past, Microsoft Office files were also commonly used.

The main payload is a variant of the MassLogger Trojan, designed to retrieve and exfiltrate user credentials from various applications, including web browsers, email clients, and VPNs. After the payload is decrypted, MassLogger parses its configuration to target specific applications.

MassLogger’s process in ANY.RUN MassLogger acting in the system, malicious process detected by the sandbox

In some cases, it may be configured as a keylogger, though this functionality is often disabled depending on the campaign. The malware collects credentials from targeted applications and stores them in a log file — typically named Log.txt — in a temporary directory within %APPDATA%. Sometimes, it sends stolen information directly from memory without writing it to disk.

The stolen credentials are exfiltrated using methods such as FTP (File Transfer Protocol) or SMTP (Simple Mail Transfer Protocol). In certain scenarios, the data is sent via email to a compromised mailbox, encoded in Base64. MassLogger generally does not persist on the system after execution, meaning it does not install components that would automatically restart upon a system reboot. It also does not request updates from the threat actor over time, making it a relatively straightforward yet effective credential-stealing tool.

MassLogger employs several advanced evasion techniques:

  • Obfuscation: Its .NET code is heavily obfuscated, using techniques like polymorphic string encryption, hash-based import resolution, and indirect method calls to hide its control flow from static analysis. Tools like de4dot can partially deobfuscate it, but the latest versions (e.g., v3) use complex interpreters and uninitialized field calls.
  • Anti-Analysis: It checks for virtualization or sandbox environments and terminates if detected. It also looks for security software like Avast or AVG, halting execution if found.
  • Dynamic Execution: By replacing Microsoft Intermediate Language (MSIL) at runtime, it thwarts static analysis tools like dnSpy, requiring dynamic analysis to reveal its true behavior.
  • Fileless Techniques: Operating in memory rather than writing to disk minimizes detectable artifacts.
  • Encrypted Configuration: Its configuration (e.g., C2 server details) is encrypted within the payload, decrypted only at runtime using standard .NET cryptographic functions.
  • *Legitimate Traffic Mimicry: Exfiltration over SMTP or FTP blends with normal network traffic, avoiding suspicion from basic monitoring tools.

These tactics make MassLogger a "noisy" yet stealthy stealer, balancing aggressive data theft with efforts to remain undetected.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

What are the examples of successful MassLogger campaigns?

  • Compiled HTML (CHM) Campaign (Early 2021): Cisco Talos documented a significant MassLogger campaign notable for its use of Microsoft Compiled HTML Help (.CHM) files as the initial infection vector. This marked a shift from earlier delivery methods, showcasing the malware’s adaptability. Attackers sent phishing emails with subjects like “Domestic customer inquiry” or “MOU Information,” targeting users in Europe. The emails contained RAR attachments that, when extracted, revealed .CHM files embedding JavaScript to launch the infection chain.
  • Procurement-Themed Phishing Wave (August 2021): Cyberint Research identified a series of campaigns in August 2021 targeting manufacturing and banking sectors, particularly in Europe, with phishing emails disguised as procurement requests. Emails included attachments like RAR files or Office documents with macros, delivering MassLogger to steal credentials from browsers, email clients, and VPN services. The malware exfiltrated data via SMTP to compromised mailboxes, storing stolen information in a "Log.txt" file in the %APPDATA% directory.
  • XLS-Based Industrial Targeting (March 2025): A recent campaign, noted in posts on X around March 30, 2025, involved phishing emails with fake procurement themes and malicious Excel (.XLS) files distributing MassLogger. It focused on stealing sensitive data from business applications, with exfiltration via SMTP or HTTP to attacker-controlled servers. The global scope and industrial focus suggested a continuation of MassLogger’s evolution into a tool for both broad and targeted attacks, potentially linked to initial access brokers supplying larger cybercrime groups.

These campaigns highlight MassLogger’s key strengths: its configurability, low entry cost, and evasion tactics like obfuscation, fileless execution, and anti-analysis checks. Unlike headline-grabbing ransomware attacks, MassLogger’s impact is often quieter but insidious, focusing on credential theft that can lead to downstream breaches.

Gathering threat intelligence on MassLogger

Threat intelligence is of much help in proactive defending against MassLogger. Use ANY.RUN’s Threat Intelligence Lookup to gather IOCs, study attackers’ TTPs, preempt incidents by blocking known C2 infrastructure.

Start by searching MassLogger in TI Lookup by the name and explore malicious samples that the cybersecurity community using ANY.RUN’s tools have encountered.

threatName:"masslogger"

MassLogger search results in TI Lookup MassLogger samples submitted in the Sandbox and filtered via TI Lookup

Explore each session to collect new IOCs and use them for further research. Enrich your monitoring and detection systems with the harvested indicators.

MassLogger’s IOCs in Sandbox Click the IOC button in the top right block of the analysis view interface in the Sandbox

Integrate ANY.RUN’s threat intelligence solutions in your company

Contact us

Conclusion

MassLogger’s combination of accessibility, evasion tactics, and broad data theft capabilities makes it a formidable threat. Its reliance on phishing and fileless execution demands robust email security and endpoint protection, while its stealth requires advanced threat intelligence to stay ahead of evolving campaigns.

By combining behavioral detection, network monitoring, and proactive intelligence-driven countermeasures, organizations can effectively mitigate its risks.

Start building your defenses against MassLogger with 50 requests in TI Lookup

HAVE A LOOK AT

Bumblebee Loader screenshot
Bumblebee Loader
bumblebee
Bumblebee is a highly adaptable malware loader, often used by threat actors linked to the Conti and TrickBot cybercrime groups. Since its discovery in 2021, Bumblebee has been leveraged in phishing campaigns and email thread hijacking, primarily to distribute payloads like Cobalt Strike and ransomware. The malware employs obfuscation techniques, such as DLL injection and virtual environment detection, to avoid detection and sandbox analysis. Its command-and-control infrastructure and anti-analysis features allow it to persist on infected devices, where it enables further payload downloads and system compromise.
Read More
Meduza Stealer screenshot
Meduza Stealer is an information-stealing malware primarily targeting Windows systems, designed to harvest sensitive data such as login credentials, browsing histories, cookies, cryptocurrency wallets, and password manager data. It has advanced anti-detection mechanisms, allowing it to evade many antivirus programs. The malware is distributed through various means, including phishing emails and malicious links. It’s marketed on underground forums and Telegram channels.
Read More
Remote Access Trojan screenshot
Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.
Read More
Akira Ransomware screenshot
Akira Ransomware emerged in March 2023 and compromised over 250 organizations by January 2024 with approximately $42 million in ransom payments. It employs double extortion tactics exfiltrating data before encryption and threatening to publish it on a dedicated website.
Read More
Zloader screenshot
Zloader
zloader trojan loader
Zloader is a banking trojan that uses webinjects and VNC clients to still banking credentials. This Trojan is based on leaked code from 2011, but despite its age, Zloader’s popularity has been only increasing through early 2020, when it relied on COVID-19 themed attacks.
Read More
Rootkit screenshot
Rootkit
rootkit bootkit
A rootkit is a type of malicious software designed to provide unauthorized administrative-level access to a computer or network while concealing its presence. Rootkits are tools used by cybercriminals to hide their activities, including keyloggers, spyware, and other malware, often enabling long-term system exploitation.
Read More