MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4f5d39430a340d9ffd80608eb8a53930f460fb98a81d5b61005eb28217f72e13. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



PureLogsStealer


Vendor detections: 13


Intelligence 13 IOCs 1 YARA 10 File information Comments

SHA256 hash: 4f5d39430a340d9ffd80608eb8a53930f460fb98a81d5b61005eb28217f72e13
SHA3-384 hash: 3597fecedd4f5b2998179cd473cfd6e14172d3d7493ac7e4770686e60f361e9a267212971c3c8f203593accc06daa0e0
SHA1 hash: ffdd80120ae1691b5644d763d607e0c9a74bafbd
MD5 hash: 53b60fe24ca38ec9b1fb25751611f9c6
humanhash: shade-may-leopard-princess
File name:53b60fe24ca38ec9b1fb25751611f9c6.exe
Download: download sample
Signature PureLogsStealer
File size:2'986'696 bytes
First seen:2025-08-29 17:55:25 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 553ef6236c6cb4268814330cd1e93c7d (1 x DiskWriter, 1 x PureLogsStealer)
ssdeep 49152:40YkFZGh/t1EC6hUudQnC0m5pklF3Ac/C0nhrjmopXg37EU2SOy+:4cFo11ECeMg5pkj37/C7eXg4Hg+
TLSH T1BCD53383359B54BEEA7D263F6BEB7B0794BCAE386670A2076791336D3570440C3507A2
TrID 80.0% (.EXE) WinRAR Self Extracting archive (4.x-5.x) (265042/9/39)
9.4% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
3.1% (.EXE) Win64 Executable (generic) (10522/11/4)
1.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
1.5% (.EXE) Win16 NE executable (generic) (5038/12/1)
Magika pebin
Reporter abuse_ch
Tags:exe PureLogsStealer


Avatar
abuse_ch
PureLogsStealer C2:
179.15.140.131:5463

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
179.15.140.131:5463 https://threatfox.abuse.ch/ioc/1577730/

Intelligence


File Origin
# of uploads :
1
# of downloads :
69
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
53b60fe24ca38ec9b1fb25751611f9c6.exe
Verdict:
Malicious activity
Analysis date:
2025-08-29 17:56:18 UTC
Tags:
stealer purecrypter netreactor purehvnc

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
96.5%
Tags:
injection obfusc virus
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Searching for the window
Сreating synchronization primitives
Searching for synchronization primitives
Creating a file in the %temp% subdirectories
Delayed reading of the file
Creating a process from a recently created file
Launching a process
DNS request
Connection attempt
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Reading critical registry keys
Stealing user critical data
Unauthorized injection to a system process
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
adaptive-context anti-debug crypto expired-cert fingerprint installer microsoft_visual_cc overlay overlay packed sfx threat
Verdict:
Malicious
File Type:
exe x32
First seen:
2025-08-21T18:17:00Z UTC
Last seen:
2025-08-21T18:17:00Z UTC
Hits:
~10
Result
Threat name:
PureLog Stealer
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Creates a thread in another existing process (thread injection)
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sample uses process hollowing technique
Suricata IDS alerts for network traffic
Switches to a custom stack to bypass stack traces
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected PureLog Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1767838 Sample: WUE8qGPPzw.exe Startdate: 29/08/2025 Architecture: WINDOWS Score: 100 43 carlosmiranda.loseyourip.com 2->43 61 Suricata IDS alerts for network traffic 2->61 63 Multi AV Scanner detection for dropped file 2->63 65 Multi AV Scanner detection for submitted file 2->65 67 Yara detected PureLog Stealer 2->67 10 WUE8qGPPzw.exe 21 2->10         started        signatures3 process4 file5 33 C:\Users\user\AppData\...\localizado.exe, PE32+ 10->33 dropped 35 C:\Users\user\AppData\Local\Temp\...\jli.dll, PE32+ 10->35 dropped 37 C:\Users\...\api-ms-win-crt-string-l1-1-0.dll, PE32+ 10->37 dropped 39 9 other files (none is malicious) 10->39 dropped 13 localizado.exe 10->13         started        process6 signatures7 71 Writes to foreign memory regions 13->71 73 Allocates memory in foreign processes 13->73 75 Sample uses process hollowing technique 13->75 77 Injects a PE file into a foreign processes 13->77 16 AddInProcess32.exe 4 13->16         started        process8 dnsIp9 41 carlosmiranda.loseyourip.com 179.15.140.131, 49691, 49719, 49720 ColombiaMovilCO Colombia 16->41 53 Tries to steal Mail credentials (via file / registry access) 16->53 55 Tries to harvest and steal browser information (history, passwords, etc) 16->55 57 Writes to foreign memory regions 16->57 59 4 other signatures 16->59 20 chrome.exe 1 16->20         started        24 chrome.exe 16->24 injected 26 chrome.exe 16->26 injected 28 5 other processes 16->28 signatures10 process11 dnsIp12 45 192.168.2.5, 138, 443, 49581 unknown unknown 20->45 69 Found many strings related to Crypto-Wallets (likely being stolen) 20->69 30 chrome.exe 20->30         started        signatures13 process14 dnsIp15 47 www.google.com 142.250.64.68, 443, 49696, 49699 GOOGLEUS United States 30->47 49 googlehosted.l.googleusercontent.com 142.250.65.225, 443, 49709 GOOGLEUS United States 30->49 51 clients2.googleusercontent.com 30->51
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PDB Path PE (Portable Executable) PE File Layout Win 32 Exe x86
Threat name:
Win32.Trojan.Kepavll
Status:
Malicious
First seen:
2025-08-22 23:38:00 UTC
File Type:
PE (Exe)
Extracted files:
24
AV detection:
17 of 24 (70.83%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
collection discovery
Behaviour
Checks processor information in registry
Enumerates system info in registry
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Browser Information Discovery
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Windows directory
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Unpacked files
SH256 hash:
4f5d39430a340d9ffd80608eb8a53930f460fb98a81d5b61005eb28217f72e13
MD5 hash:
53b60fe24ca38ec9b1fb25751611f9c6
SHA1 hash:
ffdd80120ae1691b5644d763d607e0c9a74bafbd
SH256 hash:
009c2ef68ebeb1b8acd3d1184773bda239f27d4ae012e6c504bb9d45b448dff2
MD5 hash:
688aaa69293546c85d4ac917a2b37e47
SHA1 hash:
fd6229971a0a0c9e8f12847e8ac1fc18528016f3
SH256 hash:
08dea01a763865a126c2b5578f2d13b8057003aee4634aaafedbb3cbfd89cbd9
MD5 hash:
21a6d06ceff732b7ab8824b299f5bd96
SHA1 hash:
9c2db982794fbdd7e2937d0f16dda60734f6e670
SH256 hash:
2f402a03586d924dfb2ae14b4b88d89b79884fc66da304a36c59044a3dda7228
MD5 hash:
6b1a81987f2b4d9194a56aeed1b4b60f
SHA1 hash:
668809306825df323239b9d0cc34d0d97ef5cfca
SH256 hash:
5aa6d6d77f9a4c3dfda8308521f61c2f56037771205ba536eee709f43796c16f
MD5 hash:
1aa4a74ff779ee4351a88c45aef45111
SHA1 hash:
b8b4a052a19c42a11165da6a91b37e3b4a9510e7
SH256 hash:
676619dd2ee6fe9bee361f2783f24e460caeee10bbcbc6289aafde7e9df46dff
MD5 hash:
01be4331cc3eb5351f7583065a5b3138
SHA1 hash:
d574bc101354c7137285c7034355382fd7664fd7
SH256 hash:
74e1132e513272032326497b62e883bd30f4291e269cebca9c65d8698ed3d7e5
MD5 hash:
e1693ed4dfc1cbb0362c54960270681e
SHA1 hash:
807abfb90757799a4b8323d01265eb9b3ee185db
SH256 hash:
a9c42e9cdda14d0c054ad7a03424b2e5220ec3ea232788d124ad858cd0843235
MD5 hash:
f1c84cdd8aabe6c062559f5e57852694
SHA1 hash:
89350c282ce3cd961e7e8c3d24303ffaf7c6f788
SH256 hash:
cdca86f206568133ae030cbe6f0aed62ffd6f0d3dbf779df4e58f89184abc643
MD5 hash:
c86c32c0da9c3c8c962893be6affd6e3
SHA1 hash:
526dbf6bf6e22a2f012824b6de419b7704d5335a
SH256 hash:
dd94754cf7b40513b86c71a4f6e7f4637c9eb5fde6f03c4ad352160d06d7ac55
MD5 hash:
4779747a28d729b4d75a90597f77e3b8
SHA1 hash:
6038a1cc7da0bde4a111e1b22baa49cc9495c0cd
SH256 hash:
f3d1d6beb302811e9a53622d0009b062aa5ddc0b745467e88e58026742465b96
MD5 hash:
07c16bb5cc8248c2db5dc01cfb4429a0
SHA1 hash:
8770adf7fed6f7a51792a617aa6130cc69e26cbc
SH256 hash:
ff1f67bb55ce3710a7bbd921c28f5e9cd027a1eda81d426833503de7f830f473
MD5 hash:
f1762444047f53206d286eb489c066c5
SHA1 hash:
d4c3746dd5c9e968427228bc95c948d38e4cd0ff
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CP_AllMal_Detector
Author:DiegoAnalytics
Description:CrossPlatform All Malwares Detector: Detect PE, ELF, Mach-O, scripts, archives; overlay, obfuscation, encryption, spoofing, hiding, high entropy, network communication
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:NET
Author:malware-lu
Rule name:pe_imphash
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments