MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3c65b308401dd9d3a47703d1865a800a01478634e167e4a146041cf0810b5e7c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



PureLogsStealer


Vendor detections: 16


Intelligence 16 IOCs YARA 8 File information Comments

SHA256 hash: 3c65b308401dd9d3a47703d1865a800a01478634e167e4a146041cf0810b5e7c
SHA3-384 hash: 7b6d680c7777654ae107ff2df69bde16c215fa3f17a55e6261a0eb7883c9f98aea59c700f1ff21db9c21d698392c84e8
SHA1 hash: df5d7e40fa2ed15188a2b8533827e0cb468c0ed7
MD5 hash: abae1083efc0badbd65b12078231b0a2
humanhash: quebec-grey-earth-apart
File name:3c65b308401dd9d3a47703d1865a800a01478634e167e4a146041cf0810b5e7c
Download: download sample
Signature PureLogsStealer
File size:1'046'536 bytes
First seen:2025-01-09 12:16:54 UTC
Last seen:2025-01-10 14:08:29 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'744 x AgentTesla, 19'609 x Formbook, 12'242 x SnakeKeylogger)
ssdeep 24576:k1zGUxjAtFQUuxonhaK82Fexxl3aPRL6VvU3mFZFMJFzt:KLGtFQUuxo0K82Cu+vAmFQN
TLSH T1F725F1983121B49FC493C9718994DEB4EA312DABA707C303A1D72DEFBE1D5979E101E2
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10522/11/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4504/4/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Magika pebin
File icon (PE):PE icon
dhash icon 7474666674389882 (2 x PureLogsStealer, 2 x AgentTesla, 1 x Expiro)
Reporter adrian__luca
Tags:exe PureLogStealer

Intelligence


File Origin
# of uploads :
2
# of downloads :
455
Origin country :
HU HU
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
3c65b308401dd9d3a47703d1865a800a01478634e167e4a146041cf0810b5e7c
Verdict:
Suspicious activity
Analysis date:
2025-01-09 12:15:18 UTC
Tags:
netreactor

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
92.5%
Tags:
injection micro shell
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Сreating synchronization primitives
Creating a process with a hidden window
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Adding an access-denied ACE
Creating a file in the %temp% directory
Launching a process
Adding an exclusion to Microsoft Defender
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
obfuscated packed packed packer_detected vbnet
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
PureLog Stealer
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Adds a directory exclusion to Windows Defender
AI detected suspicious sample
Allocates memory in foreign processes
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Scheduled temp file as task from temp location
Suricata IDS alerts for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected Costura Assembly Loader
Yara detected PureLog Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1586660 Sample: UWRUo24Eqr.exe Startdate: 09/01/2025 Architecture: WINDOWS Score: 100 47 Suricata IDS alerts for network traffic 2->47 49 Sigma detected: Scheduled temp file as task from temp location 2->49 51 Multi AV Scanner detection for submitted file 2->51 53 9 other signatures 2->53 7 UWRUo24Eqr.exe 7 2->7         started        11 LHSgJp.exe 5 2->11         started        process3 file4 37 C:\Users\user\AppData\Roaming\LHSgJp.exe, PE32 7->37 dropped 39 C:\Users\user\...\LHSgJp.exe:Zone.Identifier, ASCII 7->39 dropped 41 C:\Users\user\AppData\Local\...\tmp9552.tmp, XML 7->41 dropped 43 C:\Users\user\AppData\...\UWRUo24Eqr.exe.log, ASCII 7->43 dropped 55 Uses schtasks.exe or at.exe to add and modify task schedules 7->55 57 Writes to foreign memory regions 7->57 59 Allocates memory in foreign processes 7->59 61 Adds a directory exclusion to Windows Defender 7->61 13 RegSvcs.exe 2 7->13         started        17 powershell.exe 23 7->17         started        19 powershell.exe 23 7->19         started        21 schtasks.exe 1 7->21         started        63 Multi AV Scanner detection for dropped file 11->63 65 Machine Learning detection for dropped file 11->65 67 Injects a PE file into a foreign processes 11->67 23 schtasks.exe 11->23         started        25 RegSvcs.exe 11->25         started        signatures5 process6 dnsIp7 45 193.34.212.17, 33102, 49735, 49744 PL-SKYTECH-ASPL Poland 13->45 69 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 13->69 71 Loading BitLocker PowerShell Module 17->71 27 conhost.exe 17->27         started        29 WmiPrvSE.exe 17->29         started        31 conhost.exe 19->31         started        33 conhost.exe 21->33         started        35 conhost.exe 23->35         started        signatures8 process9
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2024-11-29 14:37:55 UTC
AV detection:
23 of 38 (60.53%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
unknown_loader_037
Similar samples:
Result
Malware family:
n/a
Score:
  8/10
Tags:
discovery execution
Behaviour
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Checks computer location settings
Command and Scripting Interpreter: PowerShell
Verdict:
Malicious
Tags:
Win.Packed.Pwsx-10038143-0
YARA:
n/a
Unpacked files
SH256 hash:
98071f9f88ae150a0be343fc39088b2341da519d0ff7c3e18a6f0f4142bd3c66
MD5 hash:
c78893cc557a58f3b2ac648c795ebedd
SHA1 hash:
6e4df93696ff2f3996867c25d9d3817704baeaab
SH256 hash:
37297919ba21fb6ad04fe15110f9fb6932b62809a1b04f7802942ce7b71899c9
MD5 hash:
945e8f4f3546f904525fe8e169a50456
SHA1 hash:
4a32b4d374abea8b83062f791103cb2f57acebc7
Detections:
SUSP_OBF_NET_Reactor_Indicators_Jan24
SH256 hash:
fb4ec970789db24de964329477e4bee41ef68c90ea390824dff021fd1b0cefd2
MD5 hash:
af460838f805e92de08cb37c116fcfd7
SHA1 hash:
036a698b844ddb5e2dc010bf89ff9c8e791f6a22
SH256 hash:
4b07b8e837879474559db314155241aa420b65b86e10d5156314fa69cb783bbd
MD5 hash:
f028653dc5a00dba62d99d7ed4d79b7d
SHA1 hash:
f43da2cfadde3003ed3ca7a9bfc64a9c4dbff415
Detections:
SUSP_OBF_NET_ConfuserEx_Name_Pattern_Jan24 SUSP_OBF_NET_Reactor_Indicators_Jan24
SH256 hash:
9b357e7e3b6eeac2ddd07543fac527f9bd776cb49a1165063fdbfb1096022232
MD5 hash:
583b3951fb7ba2d1e8270c095ae86817
SHA1 hash:
0dbe824e2262c3b60d4a609adc93426c6bdbcc3b
Detections:
SUSP_OBF_NET_Reactor_Indicators_Jan24
SH256 hash:
3c65b308401dd9d3a47703d1865a800a01478634e167e4a146041cf0810b5e7c
MD5 hash:
abae1083efc0badbd65b12078231b0a2
SHA1 hash:
df5d7e40fa2ed15188a2b8533827e0cb468c0ed7
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_KB_CERT_7c1118cbbadc95da3752c46e47a27438
Author:ditekSHen
Description:Detects executables signed with stolen, revoked or invalid certificates
Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:pe_imphash
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high

Comments