MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2a111b1a6650ea6e6b369583f8afe1bf8c5bb6164cb12f8e833d0638c1c2deaf. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



PureLogsStealer


Vendor detections: 12


Intelligence 12 IOCs YARA 5 File information Comments 1

SHA256 hash: 2a111b1a6650ea6e6b369583f8afe1bf8c5bb6164cb12f8e833d0638c1c2deaf
SHA3-384 hash: a48a768e63e0eabba265a563fa8db835035ca348c92fc69b9dcb4c74f00b7f9ad8d9431fd174822ab7de214811473f0a
SHA1 hash: 8747013070a23b3d9dd386c1baab0cb79cff3786
MD5 hash: db537a09e0185f8b941af6a5d2ceda40
humanhash: mexico-fanta-comet-west
File name:db537a09e0185f8b941af6a5d2ceda40
Download: download sample
Signature PureLogsStealer
File size:610'304 bytes
First seen:2024-05-14 04:44:50 UTC
Last seen:2024-05-14 05:21:48 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'672 x AgentTesla, 19'489 x Formbook, 12'212 x SnakeKeylogger)
ssdeep 12288:Z48Xz4N3jJuKiMGejML/ldDKdgM/pMp00TIhmP8mWdCcLxUX0M39F+n:ePNT0KR/MqdgMhr6IhmkmWXuEM3Cn
Threatray 2'440 similar samples on MalwareBazaar
TLSH T17AD42398C05866B7FDB03EBD8BF6BD141394CFC744A8E58746F9029BE2054EFA142AD1
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4504/4/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Reporter zbetcheckin
Tags:32 exe PureLogStealer

Intelligence


File Origin
# of uploads :
2
# of downloads :
379
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
2a111b1a6650ea6e6b369583f8afe1bf8c5bb6164cb12f8e833d0638c1c2deaf.exe
Verdict:
Malicious activity
Analysis date:
2024-05-14 04:45:57 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Gathering data
Result
Verdict:
Malware
Maliciousness:

Behaviour
Using the Windows Management Instrumentation requests
Сreating synchronization primitives
DNS request
Connection attempt
Sending a custom TCP request
Connecting to a non-recommended domain
Sending an HTTP GET request
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a window
Searching for synchronization primitives
Creating a file
Deleting a recently created file
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Enabling autorun by creating a file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
PureLog Stealer, zgRAT
Detection:
malicious
Classification:
spre.troj.adwa.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Bypasses PowerShell execution policy
Drops PE files to the startup folder
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Powershell drops PE file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Sigma detected: Copy file to startup via Powershell
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Script Execution From Temp Folder
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected AntiVM3
Yara detected Costura Assembly Loader
Yara detected PureLog Stealer
Yara detected zgRAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1440993 Sample: zhxTuNW2r5.exe Startdate: 14/05/2024 Architecture: WINDOWS Score: 100 60 relay-04-static.cloud 2->60 62 relay-03-static.cloud 2->62 64 2 other IPs or domains 2->64 72 Multi AV Scanner detection for domain / URL 2->72 74 Malicious sample detected (through community Yara rule) 2->74 76 Antivirus detection for URL or domain 2->76 78 15 other signatures 2->78 8 owwktu.exe 2->8         started        11 yqsubbstg.exe 14 3 2->11         started        13 zhxTuNW2r5.exe 16 5 2->13         started        17 4 other processes 2->17 signatures3 process4 dnsIp5 86 Multi AV Scanner detection for dropped file 8->86 88 Machine Learning detection for dropped file 8->88 90 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 8->90 19 powershell.exe 8->19         started        23 owwktu.exe 8->23         started        92 Bypasses PowerShell execution policy 11->92 94 Injects a PE file into a foreign processes 11->94 25 powershell.exe 12 11->25         started        27 yqsubbstg.exe 2 11->27         started        29 yqsubbstg.exe 11->29         started        66 relay-02-static.network 185.196.10.99, 49731, 49734, 49735 SIMPLECARRIERCH Switzerland 13->66 68 relay-04-static.cloud 111.90.145.141, 49730, 49732, 49733 SHINJIRU-MY-AS-APShinjiruTechnologySdnBhdMY Malaysia 13->68 54 C:\Users\user\AppData\Local\...\yqsubbstg.exe, PE32 13->54 dropped 56 C:\Users\user\AppData\Local\...\vnskpbe.exe, PE32 13->56 dropped 58 C:\Users\user\AppData\Local\Temp\owwktu.exe, PE32+ 13->58 dropped 96 Modifies the context of a thread in another process (thread injection) 17->96 31 vnskpbe.exe 17->31         started        34 powershell.exe 17->34         started        36 powershell.exe 17->36         started        38 5 other processes 17->38 file6 signatures7 process8 dnsIp9 48 C:\Users\user\AppData\Roaming\...\Sys.exe, PE32+ 19->48 dropped 40 conhost.exe 19->40         started        50 C:\Users\user\AppData\...\yqsubbstg.exe, PE32 25->50 dropped 80 Drops PE files to the startup folder 25->80 82 Powershell drops PE file 25->82 42 conhost.exe 25->42         started        70 relay-03-static.cloud 111.90.145.132, 7722 SHINJIRU-MY-AS-APShinjiruTechnologySdnBhdMY Malaysia 31->70 84 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 31->84 52 C:\Users\user\AppData\Roaming\...\vnskpbe.exe, PE32 34->52 dropped 44 conhost.exe 34->44         started        46 conhost.exe 36->46         started        file10 signatures11 process12
Threat name:
ByteCode-MSIL.Trojan.Jalapeno
Status:
Malicious
First seen:
2024-05-13 20:28:03 UTC
File Type:
PE (.Net Exe)
Extracted files:
1
AV detection:
21 of 24 (87.50%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:zgrat agilenet execution rat
Behaviour
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Command and Scripting Interpreter: PowerShell
Suspicious use of SetThreadContext
Drops startup file
Executes dropped EXE
Loads dropped DLL
Obfuscated with Agile.Net obfuscator
Downloads MZ/PE file
Detect ZGRat V1
ZGRat
Unpacked files
SH256 hash:
8be442aee61bfe52f95c47b041b04e285df367dd23a7677fd8f920f889251e65
MD5 hash:
f4e5c29ed655addfa389c0bc6a19b581
SHA1 hash:
932a54a563ea48898665dd02df17ca01096907f5
SH256 hash:
19efdf03cb94895935225795f68bb9abfded1869687367013b8b4eee3cc99372
MD5 hash:
4e29f75c0c51b9dec76955f0382d9541
SHA1 hash:
4899aa8e3f57339cbaec8faab777897a76fe1c3a
SH256 hash:
c8397dccfe47686cc61be13a8ce8aeadf60b5885700175a7e145cd7bc2c2f1aa
MD5 hash:
52d1f33cec3c3e7d2f2bde8cf545de2e
SHA1 hash:
1ba62d145b31b4b86978a4444c1c1df04d31cc36
SH256 hash:
2a111b1a6650ea6e6b369583f8afe1bf8c5bb6164cb12f8e833d0638c1c2deaf
MD5 hash:
db537a09e0185f8b941af6a5d2ceda40
SHA1 hash:
8747013070a23b3d9dd386c1baab0cb79cff3786
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

PureLogsStealer

Executable exe 2a111b1a6650ea6e6b369583f8afe1bf8c5bb6164cb12f8e833d0638c1c2deaf

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high

Comments



Avatar
zbet commented on 2024-05-14 04:44:52 UTC

url : hxxp://relay-02-static.network/rkei/Cusdaem.exe