Threat name:
PureLog Stealer, XWorm
Alert
Classification:
troj.spyw.evad
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Antivirus / Scanner detection for submitted sample
Bypasses PowerShell execution policy
Drops PE files with benign system names
Found direct / indirect Syscall (likely to bypass EDR)
Hides threads from debuggers
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Performs DNS queries to domains with low reputation
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Queries sensitive USB information (via WMI, WIN32_USBHUB, often done to detect sandboxes)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Potentially Suspicious Malware Callback Communication
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: PowerShell DownloadFile
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Set custom UserAgent and download file via Powershell
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: System File Execution Location Anomaly
Suricata IDS alerts for network traffic
Suspicious powershell command line found
System process connects to network (likely due to code injection or exploit)
Tries to detect debuggers (CloseHandle check)
Tries to download and execute files (via powershell)
Tries to evade analysis by execution special instruction (VM detection)
Tries to harvest and steal browser information (history, passwords, etc)
Unusual module load detection (module proxying)
Uses dynamic DNS services
Uses ping.exe to check the status of other devices and networks
Uses schtasks.exe or at.exe to add and modify task schedules
Uses the Telegram API (likely for C&C communication)
Yara detected Powershell download and execute
Yara detected PureLog Stealer
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1828538
Sample:
AcA2FIqZJg.exe
Startdate:
07/12/2025
Architecture:
WINDOWS
Score:
100
124
myvnc.ddns.net
2->124
126
hestiapanel.xyz
2->126
128
8 other IPs or domains
2->128
146
Suricata IDS alerts
for network traffic
2->146
148
Malicious sample detected
(through community Yara
rule)
2->148
150
Antivirus / Scanner
detection for submitted
sample
2->150
156
16 other signatures
2->156
11
AcA2FIqZJg.exe
5
2->11
started
15
msedgewebview3.exe
2->15
started
17
msedgewebview3.exe
2->17
started
19
3 other processes
2->19
signatures3
152
Uses dynamic DNS services
124->152
154
Performs DNS queries
to domains with low
reputation
126->154
process4
file5
116
C:\Users\user\Desktop\thor64.exe, PE32+
11->116
dropped
118
C:\Users\user\AppData\Roaming\svchost.exe, PE32
11->118
dropped
120
C:\ProgramData\Install.exe, PE32
11->120
dropped
122
C:\Users\user\AppData\...\AcA2FIqZJg.exe.log, CSV
11->122
dropped
198
Bypasses PowerShell
execution policy
11->198
200
Adds a directory exclusion
to Windows Defender
11->200
202
Drops PE files with
benign system names
11->202
21
svchost.exe
19
29
11->21
started
26
Install.exe
11->26
started
28
thor64.exe
11->28
started
34
3 other processes
11->34
204
Multi AV Scanner detection
for dropped file
15->204
30
powershell.exe
15->30
started
36
2 other processes
15->36
32
powershell.exe
17->32
started
38
2 other processes
17->38
40
6 other processes
19->40
signatures6
process7
dnsIp8
136
api.telegram.org
149.154.167.220, 443, 49699
TELEGRAMRU
United Kingdom
21->136
138
hestiapanel.xyz
196.251.100.222, 4444, 49700, 49702
ANGANI-ASKE
Seychelles
21->138
112
C:\Users\user\AppData\Local\Temp\dxfmbz.exe, PE32
21->112
dropped
162
System process connects
to network (likely due
to code injection or
exploit)
21->162
164
Multi AV Scanner detection
for dropped file
21->164
166
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
21->166
176
3 other signatures
21->176
51
5 other processes
21->51
114
C:\Users\user\AppData\Local\Temp\...\C8B4.bat, ASCII
26->114
dropped
42
cmd.exe
26->42
started
168
Overwrites code with
unconditional jumps
- possibly settings
hooks in foreign process
28->168
170
Tries to evade analysis
by execution special
instruction (VM detection)
28->170
172
Tries to detect debuggers
(CloseHandle check)
28->172
178
3 other signatures
28->178
45
conhost.exe
28->45
started
174
Loading BitLocker PowerShell
Module
30->174
47
conhost.exe
30->47
started
49
conhost.exe
32->49
started
55
3 other processes
34->55
57
2 other processes
36->57
59
2 other processes
38->59
61
6 other processes
40->61
file9
signatures10
process11
dnsIp12
180
Suspicious powershell
command line found
42->180
182
Uses ping.exe to sleep
42->182
184
Tries to download and
execute files (via powershell)
42->184
186
Uses ping.exe to check
the status of other
devices and networks
42->186
63
PING.EXE
42->63
started
66
powershell.exe
42->66
started
68
conhost.exe
42->68
started
77
4 other processes
42->77
130
ip-api.com
208.95.112.1, 443, 49705, 49706
TUT-ASUS
United States
51->130
132
i.ibb.co
207.174.26.219
RCN-ASUS
United States
51->132
134
3 other IPs or domains
51->134
110
C:\Users\user\AppData\...\msedgewebview3.exe, PE32
51->110
dropped
188
Multi AV Scanner detection
for dropped file
51->188
190
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
51->190
192
Queries sensitive physical
memory information (via
WMI, Win32_PhysicalMemory,
often done to detect
virtual machines)
51->192
196
8 other signatures
51->196
70
msedgewebview3.exe
51->70
started
73
powershell.exe
51->73
started
75
powershell.exe
51->75
started
79
17 other processes
51->79
194
Queries sensitive service
information (via WMI,
Win32_LogicalDisk, often
done to detect sandboxes)
55->194
file13
signatures14
process15
dnsIp16
140
127.0.0.1
unknown
unknown
63->140
142
us.loclx.io
45.55.35.48, 443, 49696, 49697
DIGITALOCEAN-ASNUS
United States
66->142
158
Adds a directory exclusion
to Windows Defender
70->158
81
powershell.exe
70->81
started
84
powershell.exe
70->84
started
86
powershell.exe
70->86
started
96
2 other processes
70->96
160
Loading BitLocker PowerShell
Module
73->160
88
conhost.exe
73->88
started
90
conhost.exe
75->90
started
92
conhost.exe
79->92
started
94
conhost.exe
79->94
started
98
13 other processes
79->98
signatures17
process18
signatures19
144
Loading BitLocker PowerShell
Module
81->144
100
conhost.exe
81->100
started
102
conhost.exe
84->102
started
104
conhost.exe
86->104
started
106
conhost.exe
96->106
started
108
conhost.exe
96->108
started
process20
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.