MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2f80cc0fa8d8814e979d7910ddee88e84ece46c1110b7c9f564437bd41bea85f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



PureLogsStealer


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments

SHA256 hash: 2f80cc0fa8d8814e979d7910ddee88e84ece46c1110b7c9f564437bd41bea85f
SHA3-384 hash: 512939f3a6109199b9253112cf7f23b970707e67337837454a964f8d00e025aa456080d97170bb4f9b96fc2b00c41c9d
SHA1 hash: c708d644c21ccc56f6051460b8635ab723d74886
MD5 hash: 73c9e7a4dd78119ce0fd72562a72a23c
humanhash: stairway-december-zebra-mockingbird
File name:mm.hta
Download: download sample
Signature PureLogsStealer
File size:43'702 bytes
First seen:2026-02-12 18:58:08 UTC
Last seen:Never
File type:HTML Application (hta) hta
MIME type:text/html
ssdeep 384:ixVw8IvVnaQMboGUZCb7DL0PhVy8EVWV4i:ixVHIvVNMboGUZCbfL0PhVy8EVWV4i
TLSH T10013B86D495A7311ACF31CEE54FEBCE594A8C0F070397067FD1A2623D39053E6AAA58C
Magika asp
Reporter abuse_ch
Tags:hta PureLogsStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
53
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Score:
96.5%
Tags:
xtreme shell sage
Result
Verdict:
Malicious
File Type:
HTA File - Malicious
Payload URLs
URL
File name
http://172.245.209.195/33/svc.exe
HTA File
Behaviour
BlacklistAPI detected
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
powershell powershell pterodo
Result
Gathering data
Verdict:
Malicious
File Type:
html
First seen:
2026-01-28T01:37:00Z UTC
Last seen:
2026-01-28T01:44:00Z UTC
Hits:
~10
Result
Threat name:
PureLog Stealer
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Allocates memory in foreign processes
Creates a thread in another existing process (thread injection)
Encrypted powershell cmdline option found
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PowerShell case anomaly found
Powershell drops PE file
Sigma detected: Suspicious Encoded PowerShell Command Line
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious PowerShell Parameter Substring
Suricata IDS alerts for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected PureLog Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1868672 Sample: mm.hta Startdate: 12/02/2026 Architecture: WINDOWS Score: 100 66 Suricata IDS alerts for network traffic 2->66 68 Multi AV Scanner detection for submitted file 2->68 70 Yara detected PureLog Stealer 2->70 72 7 other signatures 2->72 11 mshta.exe 1 2->11         started        14 svchost.exe 1 1 2->14         started        process3 dnsIp4 78 PowerShell case anomaly found 11->78 17 cmd.exe 1 11->17         started        58 127.0.0.1 unknown unknown 14->58 signatures5 process6 signatures7 62 Encrypted powershell cmdline option found 17->62 64 PowerShell case anomaly found 17->64 20 powershell.exe 15 16 17->20         started        25 conhost.exe 17->25         started        process8 dnsIp9 50 172.245.209.195, 49681, 80 AS-COLOCROSSINGUS United States 20->50 46 C:\Users\user\AppData\Roaming\svc.exe, PE32 20->46 dropped 74 Found many strings related to Crypto-Wallets (likely being stolen) 20->74 76 Powershell drops PE file 20->76 27 svc.exe 3 20->27         started        file10 signatures11 process12 signatures13 80 Multi AV Scanner detection for dropped file 27->80 82 Writes to foreign memory regions 27->82 84 Allocates memory in foreign processes 27->84 86 Injects a PE file into a foreign processes 27->86 30 RegSvcs.exe 4 27->30         started        process14 dnsIp15 60 38.49.208.135, 49682, 49718, 49719 COGENT-174US United States 30->60 88 Tries to steal Mail credentials (via file / registry access) 30->88 90 Found many strings related to Crypto-Wallets (likely being stolen) 30->90 92 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 30->92 94 5 other signatures 30->94 34 chrome.exe 1 30->34         started        37 chrome.exe 30->37 injected 39 chrome.exe 30->39 injected 41 chrome.exe 30->41 injected signatures16 process17 dnsIp18 48 192.168.2.7, 138, 443, 49672 unknown unknown 34->48 43 chrome.exe 34->43         started        process19 dnsIp20 52 ogads-pa.clients6.google.com 142.250.217.10, 443, 49705, 49707 GOOGLEUS United States 43->52 54 play.google.com 142.250.217.14, 443, 49708, 49709 GOOGLEUS United States 43->54 56 5 other IPs or domains 43->56
Verdict:
Malware
YARA:
3 match(es)
Tags:
DeObfuscated Html PowerShell
Threat name:
Script-WScript.Dropper.Electryon
Status:
Malicious
First seen:
2026-01-26 17:17:59 UTC
File Type:
Text (HTML)
Extracted files:
1
AV detection:
9 of 36 (25.00%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
collection discovery
Behaviour
Enumerates system info in registry
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Browser Information Discovery
Enumerates physical storage devices
System Location Discovery: System Language Discovery
System Time Discovery
Drops file in Windows directory
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Checks computer location settings
Executes dropped EXE
Badlisted process makes network request
Downloads MZ/PE file
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

PureLogsStealer

HTML Application (hta) hta 2f80cc0fa8d8814e979d7910ddee88e84ece46c1110b7c9f564437bd41bea85f

(this sample)

  
Delivery method
Distributed via web download

Comments