MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4f71cd8e603fc88f358d8bbd51353436fb70837e4e93938e01f747024d54ae88. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



PureLogsStealer


Vendor detections: 12


Intelligence 12 IOCs YARA 4 File information Comments 1

SHA256 hash: 4f71cd8e603fc88f358d8bbd51353436fb70837e4e93938e01f747024d54ae88
SHA3-384 hash: e934b9a672f8922f495821a9e850fb2b759c4b0c1b0c5bff01bccd6c67d27b6aad6371b89c8701cea18b9f4260ead09f
SHA1 hash: 6e945b087ff31af47356c2808a43fd1c90d7d737
MD5 hash: 9724edb0b399a56cc67dddf78ab8278c
humanhash: ink-uranus-queen-mirror
File name:9724edb0b399a56cc67dddf78ab8278c
Download: download sample
Signature PureLogsStealer
File size:661'504 bytes
First seen:2024-05-14 03:52:23 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'672 x AgentTesla, 19'489 x Formbook, 12'212 x SnakeKeylogger)
ssdeep 12288:BjAXpNXKI+ZcDnHEOwmBAmCpoOUao0xzRbu9nq1nmVsb/D3:BchWmHEhT1o019u9nq1nme/D3
Threatray 5'288 similar samples on MalwareBazaar
TLSH T1D6E4339361C40162F5D4DA3234B0E7E543C63B8576BF293488827A18679D6902EFBF6F
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4504/4/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Reporter zbetcheckin
Tags:32 exe PureLogStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
411
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
4f71cd8e603fc88f358d8bbd51353436fb70837e4e93938e01f747024d54ae88.exe
Verdict:
Malicious activity
Analysis date:
2024-05-14 03:54:27 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Gathering data
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a file in the %AppData% subdirectories
Creating a window
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
PureLog Stealer
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Costura Assembly Loader
Yara detected PureLog Stealer
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Backdoor.Crysan
Status:
Malicious
First seen:
2024-05-02 17:13:38 UTC
File Type:
PE (.Net Exe)
Extracted files:
1
AV detection:
26 of 38 (68.42%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  6/10
Tags:
persistence
Behaviour
Suspicious behavior: AddClipboardFormatListener
Suspicious use of AdjustPrivilegeToken
Adds Run key to start application
Unpacked files
SH256 hash:
ac268a703859fec079bde8f1163259d9f46c500f1565d43b200a563f444c131e
MD5 hash:
855bfda3d10932c9ff303e7fbdece9e2
SHA1 hash:
f3f7f0972f03a4960f365dd88e865a2d398aae7e
SH256 hash:
21a65aadbe8b61da79c6bb997a86dd275417d8b0bfdb1c7d09490f5a98a2a266
MD5 hash:
c8d9c0a4c198fc60090d57389b23f2bb
SHA1 hash:
5f381a7e03f1510af8338231fbe3e7e23fe29e9b
SH256 hash:
b7141a9aa5634b5127cab106b2234caa1dcf48a68d6061c9618135fa94f35c95
MD5 hash:
1bd2ff86518e3d04c694878f9520d179
SHA1 hash:
510eebaad61105b36c41b89298971e2d789c5401
SH256 hash:
4f71cd8e603fc88f358d8bbd51353436fb70837e4e93938e01f747024d54ae88
MD5 hash:
9724edb0b399a56cc67dddf78ab8278c
SHA1 hash:
6e945b087ff31af47356c2808a43fd1c90d7d737
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

PureLogsStealer

Executable exe 4f71cd8e603fc88f358d8bbd51353436fb70837e4e93938e01f747024d54ae88

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high

Comments



Avatar
zbet commented on 2024-05-14 03:52:24 UTC

url : hxxp://relay-02-static.network/rkei/Uwrejlhr.exe