MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 48feedffa17ca579fd3ddfaae4cec3c5c15f72b7b635d34d10d3e91af5e6d488. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



PureLogsStealer


Vendor detections: 15


Intelligence 15 IOCs YARA 4 File information Comments

SHA256 hash: 48feedffa17ca579fd3ddfaae4cec3c5c15f72b7b635d34d10d3e91af5e6d488
SHA3-384 hash: 81dbe5462f18598b55cff387a677e999d55dc990a55697cac4b97802e0ccc754fe8626535b36e17aee9e11631955bc8c
SHA1 hash: 622f54fd437b877a2d39376e9f9731ede79cf7f6
MD5 hash: 1d7724eb0818b5ed130f70f642c7239f
humanhash: orange-network-fish-magazine
File name:invoice No. 5425-26.exe
Download: download sample
Signature PureLogsStealer
File size:1'103'360 bytes
First seen:2025-07-30 12:47:19 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'744 x AgentTesla, 19'610 x Formbook, 12'242 x SnakeKeylogger)
ssdeep 24576:AJAMdCBHRIr5MVydthLBPbJClqGZcobH5QX5YnTWVlukoeh:AJddCBeMOBDJCQijNQSnSVlukth
Threatray 190 similar samples on MalwareBazaar
TLSH T1373512556799C910D8BE0BB45830E1B40B75BE8AF951E30A9FC8BDDB7E32B418D06363
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10522/11/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4504/4/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Magika pebin
Reporter abuse_ch
Tags:exe PureLogsStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
40
Origin country :
SE SE
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
invoice No. 5425-26.exe
Verdict:
Malicious activity
Analysis date:
2025-07-30 13:05:21 UTC
Tags:
auto-sch-xml

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
92.5%
Tags:
spawn shell hello
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Сreating synchronization primitives
Searching for synchronization primitives
Sending a custom TCP request
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
obfuscated packed packed packer_detected
Result
Threat name:
PureLog Stealer
Detection:
malicious
Classification:
troj.evad
Score:
90 / 100
Signature
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Adds a directory exclusion to Windows Defender
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Scheduled temp file as task from temp location
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected AntiVM3
Yara detected PureLog Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1747072 Sample: invoice No. 5425-26.exe Startdate: 30/07/2025 Architecture: WINDOWS Score: 90 44 Sigma detected: Scheduled temp file as task from temp location 2->44 46 Multi AV Scanner detection for submitted file 2->46 48 Yara detected PureLog Stealer 2->48 50 8 other signatures 2->50 7 invoice No. 5425-26.exe 7 2->7         started        11 uZnIDcGAk.exe 5 2->11         started        process3 file4 36 C:\Users\user\AppData\Roaming\uZnIDcGAk.exe, PE32 7->36 dropped 38 C:\Users\...\uZnIDcGAk.exe:Zone.Identifier, ASCII 7->38 dropped 40 C:\Users\user\AppData\Local\...\tmp4F03.tmp, XML 7->40 dropped 42 C:\Users\user\...\invoice No. 5425-26.exe.log, ASCII 7->42 dropped 52 Adds a directory exclusion to Windows Defender 7->52 54 Injects a PE file into a foreign processes 7->54 13 powershell.exe 23 7->13         started        16 powershell.exe 23 7->16         started        18 invoice No. 5425-26.exe 2 7->18         started        20 schtasks.exe 1 7->20         started        56 Multi AV Scanner detection for dropped file 11->56 22 uZnIDcGAk.exe 11->22         started        24 schtasks.exe 11->24         started        signatures5 process6 signatures7 58 Loading BitLocker PowerShell Module 13->58 26 conhost.exe 13->26         started        28 WmiPrvSE.exe 13->28         started        30 conhost.exe 16->30         started        60 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 18->60 32 conhost.exe 20->32         started        34 conhost.exe 24->34         started        process8
Verdict:
inconclusive
YARA:
5 match(es)
Tags:
.Net Executable PDB Path PE (Portable Executable) SOS: 0.27 Win 32 Exe x86
Threat name:
Win32.Trojan.Kepavll
Status:
Malicious
First seen:
2025-07-30 08:10:30 UTC
File Type:
PE (.Net Exe)
Extracted files:
7
AV detection:
22 of 38 (57.89%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
discovery execution persistence
Behaviour
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Checks computer location settings
Command and Scripting Interpreter: PowerShell
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
48feedffa17ca579fd3ddfaae4cec3c5c15f72b7b635d34d10d3e91af5e6d488
MD5 hash:
1d7724eb0818b5ed130f70f642c7239f
SHA1 hash:
622f54fd437b877a2d39376e9f9731ede79cf7f6
SH256 hash:
e50553fb07cf6991d485ad04c7b9e503654c8267cd2a76347fb6530004189f11
MD5 hash:
17264166047c24afbae5d9a80aedef9d
SHA1 hash:
3824856cf0f26fc2cc8c2f7b2e6c9fc2e6e73dba
SH256 hash:
7a872275b3ca98b0aa6d9556c04d1cf22e23a9d29216506828b393a2a958855f
MD5 hash:
1069eada19b4bd8904d851e744301ff3
SHA1 hash:
51ec7ab8367ad1b411f75059b88bc86b948d6787
Detections:
SUSP_OBF_NET_ConfuserEx_Name_Pattern_Jan24 SUSP_OBF_NET_Reactor_Indicators_Jan24
SH256 hash:
6005f0e4563fef5e8abfdb88cacd5b3d8fd4cff04b1af93e8e01a9990f46d5c0
MD5 hash:
3f17ed370489371093c2a3d768cb6b07
SHA1 hash:
fb4f0ddcaf872e4c7850e4cefad59a2c62f54424
SH256 hash:
277ab99e3540f25753bebd13b9aad329dc77a8edb46adce435fabed90eb08968
MD5 hash:
4c47827d2323acf9bdf661bc9242d36a
SHA1 hash:
054d7d0971e26f0c6cb05327871c4479ee0131d8
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NET
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (GUARD_CF)high

Comments