MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5866086aabad6058bc0f6fda58ea98a3bccad73cfc1c2a992851a8e97e2e9181. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



PureLogsStealer


Vendor detections: 14


Intelligence 14 IOCs YARA 3 File information Comments

SHA256 hash: 5866086aabad6058bc0f6fda58ea98a3bccad73cfc1c2a992851a8e97e2e9181
SHA3-384 hash: 8cb685676bf907bf768fb2d58f1410188f8134b9739e564dd08c191ebddc1896d90e37dd38a28886e3d26f81a5837aa5
SHA1 hash: cf95978e528305c35cc3e39d08cd0fe70bd6df76
MD5 hash: 855bf16e88810592d993592e4552b065
humanhash: illinois-mobile-solar-leopard
File name:5866086aabad6058bc0f6fda58ea98a3bccad73cfc1c2a992851a8e97e2e9181
Download: download sample
Signature PureLogsStealer
File size:1'023'488 bytes
First seen:2025-11-05 13:38:43 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'741 x AgentTesla, 19'606 x Formbook, 12'242 x SnakeKeylogger)
ssdeep 24576:ptmOqFIXwnE0rfJZNcANWFNgIt646gFr1VpOOUDIt:pMD2Xwdf3NAFj6iFrZUDI
TLSH T1D22512913359DA16D62567F42DB2F57203FA2E2EE421E2976FC66CEB3532F005A00B53
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10522/11/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4504/4/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Magika pebin
Reporter JAMESWT_WT
Tags:185-149-24-201 exe PureLogsStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
112
Origin country :
IT IT
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
5866086aabad6058bc0f6fda58ea98a3bccad73cfc1c2a992851a8e97e2e9181
Verdict:
Malicious activity
Analysis date:
2025-11-05 13:41:50 UTC
Tags:
stealer purecrypter netreactor purehvnc

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
92.5%
Tags:
virus msil
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file
Connection attempt
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Creating a window
Сreating synchronization primitives
Unauthorized injection to a recently created process
Restart of the analyzed sample
Gathering data
Verdict:
Malicious
Labled as:
Trojan_MSIL_DarkCloud_ABJB_MTB
Verdict:
Malicious
File Type:
exe x32
First seen:
2025-10-29T07:41:00Z UTC
Last seen:
2025-11-02T01:39:00Z UTC
Hits:
~100
Verdict:
inconclusive
YARA:
10 match(es)
Tags:
.Net Executable Managed .NET PDB Path PE (Portable Executable) PE File Layout SOS: 0.53 Win 32 Exe x86
Threat name:
ByteCode-MSIL.Trojan.DarkCloud
Status:
Malicious
First seen:
2025-10-29 17:19:49 UTC
AV detection:
19 of 24 (79.17%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
unc_loader_037 xworm
Similar samples:
Result
Malware family:
n/a
Score:
  7/10
Tags:
collection discovery spyware stealer
Behaviour
Enumerates system info in registry
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Browser Information Discovery
System Location Discovery: System Language Discovery
Drops file in Windows directory
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Reads WinSCP keys stored on the system
Reads user/profile data of web browsers
Unpacked files
SH256 hash:
5866086aabad6058bc0f6fda58ea98a3bccad73cfc1c2a992851a8e97e2e9181
MD5 hash:
855bf16e88810592d993592e4552b065
SHA1 hash:
cf95978e528305c35cc3e39d08cd0fe70bd6df76
SH256 hash:
3266f376164f34e5e97bc51f94332c103a24b672def9df4cf0f7816a7c90f1b8
MD5 hash:
0b9dc0456219988b402cf62cd7b72365
SHA1 hash:
1ad28113e8c98c99e7eda1678291d4ab822d0a51
SH256 hash:
08c94710eaf26650fc1d538f107d675b00a89258d858483f6a77f1db6e0bb613
MD5 hash:
08de5d31a731ef20cb96ad99d8204a0c
SHA1 hash:
79c093b5d5ad0f2b500ee406239a7eb4e14fe2c1
Detections:
SUSP_OBF_NET_ConfuserEx_Name_Pattern_Jan24 SUSP_OBF_NET_Reactor_Indicators_Jan24
SH256 hash:
81c878e71a82aa8f4175648d188a1f75acf99cd0b02ef0f48e814fb4f44f0fc0
MD5 hash:
2c401550efe4777b67fa67fb7cecdfbc
SHA1 hash:
e5515434b9685499ad38499f4b59ed8c017b88b4
SH256 hash:
0504188a85d6ef12359202eaad4c200583068d7c348cd68e39e5f7890e65e2d7
MD5 hash:
7dd9ed7e2d57ada40a8841a63cdc48a6
SHA1 hash:
6b434a7a013500adf5c6fe1cef5eef39a5c65a9e
Detections:
SUSP_OBF_NET_Reactor_Indicators_Jan24
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NET
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments