Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now

MassLogger

75
Global rank
78 infographic chevron month
Month rank
67 infographic chevron week
Week rank
0
IOCs

MassLogger is a credential stealer and keylogger first identified in April 2020. It has been actively used in cyber campaigns to exfiltrate sensitive information from compromised systems. It is designed for easy use by less tech-savvy actors and is prominent for the capability of spreading via USB drives. It targets both individuals and organizations in various industries, mostly in Europe and the USA.

Keylogger
Type
Unknown
Origin
4 January, 2020
First seen
2 April, 2025
Last seen

How to analyze MassLogger with ANY.RUN

Type
Unknown
Origin
4 January, 2020
First seen
2 April, 2025
Last seen

IOCs

IP addresses
46.246.4.5
202.172.25.11
47.106.186.21
183.81.164.154
47.115.6.72
141.136.34.78
94.127.7.174
188.121.43.27
185.106.92.64
195.85.115.195
203.170.129.7
149.248.76.158
162.221.185.10
51.68.11.192
85.187.128.28
144.91.112.76
91.196.124.59
94.126.169.122
185.31.121.136
67.215.233.8
Domains
mail.miniorangeman.com
mail.wwaluminum.com
gator3220.hostgator.com
mail.mzgold.ir
mail.azenet.az
cphost14.qhoster.net
mail.mpsv-hnz-k.ba
mail.safetylinedxb.ae
mail.supamemo.sbs
mail.bouttases.fr
mail.siltasmermer.com
inv3stwithus.com
mail.bethesdakindergarten.com
mail.worldsky-logistic.com
mail.rafinadumai.co.id
mail.fransomm.com
ltrzgogrzsit.com
ayudasaudiovisuales.co
daipro.com.mx
webmail.gmaship.com
Last Seen at
Last Seen at

Recent blog posts

post image
Release Notes: Android VM, Pre-Installed Dev...
watchers 386
comments 0
post image
How to Hunt and Investigate Linux Malware 
watchers 707
comments 0
post image
Salvador Stealer: New Android Malware That Ph...
watchers 4225
comments 0

What is MassLogger malware?

MassLogger is a sophisticated .NET-based malware classified as a credential stealer and keylogger observed from April 2020. It has since evolved with regular updates from its creator, known as NYANxCAT, who is also linked to other malware like LimeRAT and AsyncRAT.

Its high configurability, evasion techniques, and broad targeting capabilities, as well as the price of approximately $100, made it a popular item on dark web forums. It affects both individual users and organizations, with campaigns targeting industries like manufacturing, banking, and logistics across regions such as Europe (Turkey, Latvia, Italy, etc.), the U.S., and beyond.

MassLogger typically infiltrates networks through social engineering tactics, most often via phishing emails. They may target business users and masquerade as legitimate correspondence, such as procurement requests, shipping notices (e.g., referencing companies like Maersk), or other professional communications.

It can also spread via USB drives by injecting itself into files, infecting new systems when those files are opened.

In some campaigns, MassLogger has been distributed via compiled HTML files (.chm), which, when opened, execute embedded JavaScript to initiate the infection chain.

The infection chain is often multi-staged, involving scripting languages like PowerShell and .NET assemblies, making it harder to trace back to the initial vector.

TTPs of MassLogger attacks MassLogger tactics and techniques via MITRE ATT&CK Matrix

MassLogger is highly efficient at collecting and exfiltrating data. It extracts credentials from a wide range of applications, including web browsers (Chrome, Firefox, Edge), email clients (Outlook, Thunderbird, Foxmail), messaging apps (Discord, Telegram, Pidgin), VPN services (NordVPN), and FTP clients (FileZilla). It can also extract cryptocurrency wallet data.

Besides, it engages keylogging, clipboard monitoring, screen capturing, gathering system info via WMI queries.

Get started today for free

Analyze malware and phishing in a fully-interactive sandbox

Create free account

MassLogger Stealer’s prominent features

  • Abuses USB drives to infiltrate systems via infected files
  • To faster achieve its goals and avoid detection, can work without persistence mechanisms
  • Extracts data from a wide range of apps, including browsers, messengers, VPNs, network clients etc.
  • Available as a Malware-as-a-Service (MaaS) tool for $100 which amplifies its reach
  • The focus on fresh session cookies and 2FA bypass (via anti-detect browsers) heightens its threat to modern authentication systems.

MassLogger execution process and technical details

All the variety of MassLogger’s vicious ways is illustrated by fresh malware samples and analyses in ANY.RUN’s Interactive Sandbox. Let’s view one of the recent analysis sessions.

See MassLogger’s sample in action

The intrusion often begins with a phishing email containing a malicious attachment — typically a RAR-compressed archive with an unusual filename extension, such as .chm or .pif — used to bypass email filters. In the past, Microsoft Office files were also commonly used.

The main payload is a variant of the MassLogger Trojan, designed to retrieve and exfiltrate user credentials from various applications, including web browsers, email clients, and VPNs. After the payload is decrypted, MassLogger parses its configuration to target specific applications.

MassLogger’s process in ANY.RUN MassLogger acting in the system, malicious process detected by the sandbox

In some cases, it may be configured as a keylogger, though this functionality is often disabled depending on the campaign. The malware collects credentials from targeted applications and stores them in a log file — typically named Log.txt — in a temporary directory within %APPDATA%. Sometimes, it sends stolen information directly from memory without writing it to disk.

The stolen credentials are exfiltrated using methods such as FTP (File Transfer Protocol) or SMTP (Simple Mail Transfer Protocol). In certain scenarios, the data is sent via email to a compromised mailbox, encoded in Base64. MassLogger generally does not persist on the system after execution, meaning it does not install components that would automatically restart upon a system reboot. It also does not request updates from the threat actor over time, making it a relatively straightforward yet effective credential-stealing tool.

MassLogger employs several advanced evasion techniques:

  • Obfuscation: Its .NET code is heavily obfuscated, using techniques like polymorphic string encryption, hash-based import resolution, and indirect method calls to hide its control flow from static analysis. Tools like de4dot can partially deobfuscate it, but the latest versions (e.g., v3) use complex interpreters and uninitialized field calls.
  • Anti-Analysis: It checks for virtualization or sandbox environments and terminates if detected. It also looks for security software like Avast or AVG, halting execution if found.
  • Dynamic Execution: By replacing Microsoft Intermediate Language (MSIL) at runtime, it thwarts static analysis tools like dnSpy, requiring dynamic analysis to reveal its true behavior.
  • Fileless Techniques: Operating in memory rather than writing to disk minimizes detectable artifacts.
  • Encrypted Configuration: Its configuration (e.g., C2 server details) is encrypted within the payload, decrypted only at runtime using standard .NET cryptographic functions.
  • *Legitimate Traffic Mimicry: Exfiltration over SMTP or FTP blends with normal network traffic, avoiding suspicion from basic monitoring tools.

These tactics make MassLogger a "noisy" yet stealthy stealer, balancing aggressive data theft with efforts to remain undetected.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

What are the examples of successful MassLogger campaigns?

  • Compiled HTML (CHM) Campaign (Early 2021): Cisco Talos documented a significant MassLogger campaign notable for its use of Microsoft Compiled HTML Help (.CHM) files as the initial infection vector. This marked a shift from earlier delivery methods, showcasing the malware’s adaptability. Attackers sent phishing emails with subjects like “Domestic customer inquiry” or “MOU Information,” targeting users in Europe. The emails contained RAR attachments that, when extracted, revealed .CHM files embedding JavaScript to launch the infection chain.
  • Procurement-Themed Phishing Wave (August 2021): Cyberint Research identified a series of campaigns in August 2021 targeting manufacturing and banking sectors, particularly in Europe, with phishing emails disguised as procurement requests. Emails included attachments like RAR files or Office documents with macros, delivering MassLogger to steal credentials from browsers, email clients, and VPN services. The malware exfiltrated data via SMTP to compromised mailboxes, storing stolen information in a "Log.txt" file in the %APPDATA% directory.
  • XLS-Based Industrial Targeting (March 2025): A recent campaign, noted in posts on X around March 30, 2025, involved phishing emails with fake procurement themes and malicious Excel (.XLS) files distributing MassLogger. It focused on stealing sensitive data from business applications, with exfiltration via SMTP or HTTP to attacker-controlled servers. The global scope and industrial focus suggested a continuation of MassLogger’s evolution into a tool for both broad and targeted attacks, potentially linked to initial access brokers supplying larger cybercrime groups.

These campaigns highlight MassLogger’s key strengths: its configurability, low entry cost, and evasion tactics like obfuscation, fileless execution, and anti-analysis checks. Unlike headline-grabbing ransomware attacks, MassLogger’s impact is often quieter but insidious, focusing on credential theft that can lead to downstream breaches.

Gathering threat intelligence on MassLogger

Threat intelligence is of much help in proactive defending against MassLogger. Use ANY.RUN’s Threat Intelligence Lookup to gather IOCs, study attackers’ TTPs, preempt incidents by blocking known C2 infrastructure.

Start by searching MassLogger in TI Lookup by the name and explore malicious samples that the cybersecurity community using ANY.RUN’s tools have encountered.

threatName:"masslogger"

MassLogger search results in TI Lookup MassLogger samples submitted in the Sandbox and filtered via TI Lookup

Explore each session to collect new IOCs and use them for further research. Enrich your monitoring and detection systems with the harvested indicators.

MassLogger’s IOCs in Sandbox Click the IOC button in the top right block of the analysis view interface in the Sandbox

Integrate ANY.RUN’s threat intelligence solutions in your company

Contact us

Conclusion

MassLogger’s combination of accessibility, evasion tactics, and broad data theft capabilities makes it a formidable threat. Its reliance on phishing and fileless execution demands robust email security and endpoint protection, while its stealth requires advanced threat intelligence to stay ahead of evolving campaigns.

By combining behavioral detection, network monitoring, and proactive intelligence-driven countermeasures, organizations can effectively mitigate its risks.

Start building your defenses against MassLogger with 50 requests in TI Lookup

HAVE A LOOK AT

DarkGate screenshot
DarkGate
darkgate
DarkGate is a loader, which possesses extensive functionality, ranging from keylogging to crypto mining. Written in Delphi, this malware is known for the use of AutoIT scripts in its infection process. Thanks to this malicious software’s versatile architecture, it is widely used by established threat actors.
Read More
Emmenhtal screenshot
Emmenhtal
emmenhtal
First identified in 2024, Emmenhtal operates by embedding itself within modified legitimate Windows binaries, often using HTA (HTML Application) files to execute malicious scripts. It has been linked to the distribution of malware such as CryptBot and Lumma Stealer. Emmenhtal is typically disseminated through phishing campaigns, including fake video downloads and deceptive email attachments.
Read More
Play Ransomware screenshot
Play aka PlayCrypt ransomware group has been successfully targeting corporations, municipal entities, and infrastruction all over the world for about three years. It infiltrates networks via software vulnerabilities, phishing links and compromised websites. The ransomware abuses Windows system services to evade detection and maintain persistence. Play encrypts user files and steals sensitive data while demanding a ransom.
Read More