MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5eff63469fff981124eca685943116a6a89bc912e03cd7dba31edf2cd6569112. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



PureLogsStealer


Vendor detections: 9


Intelligence 9 IOCs YARA 4 File information Comments

SHA256 hash: 5eff63469fff981124eca685943116a6a89bc912e03cd7dba31edf2cd6569112
SHA3-384 hash: 000c9324bac43e02445bbef02225677544905fc994c721467af5009bab841049e4a8a2fac50c43a6d9501f246605b536
SHA1 hash: b024378eb23277e451fdb538243f4ad5077ac363
MD5 hash: 4ac989c7fdfbdee4e76c2c9677522cd3
humanhash: july-zebra-east-fourteen
File name:SecuriteInfo.com.Win32.TrojanX-gen.21642.1659
Download: download sample
Signature PureLogsStealer
File size:857'088 bytes
First seen:2024-05-11 09:26:43 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'672 x AgentTesla, 19'489 x Formbook, 12'212 x SnakeKeylogger)
ssdeep 24576:UiTm6qj6qLCfhGraYj89NCF56bKLmOccp:E/chGGYjqNCzfFp
TLSH T1D9053395D362D25ED63ACF76A2C29730B7335331288FDFBD8104235581BD4CD9A687A8
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4504/4/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Reporter SecuriteInfoCom
Tags:exe PureLogStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
483
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
5eff63469fff981124eca685943116a6a89bc912e03cd7dba31edf2cd6569112.exe
Verdict:
Malicious activity
Analysis date:
2024-05-11 09:27:20 UTC
Tags:
purecrypter purelogs exfiltration stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
DNS request
Connection attempt
Sending a custom TCP request
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
masquerade packed purelogs
Result
Threat name:
PureLog Stealer
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Antivirus / Scanner detection for submitted sample
Contains functionality to capture screen (.Net source)
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Yara detected Costura Assembly Loader
Yara detected PureLog Stealer
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.PureLogs
Status:
Malicious
First seen:
2024-05-02 22:20:11 UTC
File Type:
PE (.Net Exe)
Extracted files:
1
AV detection:
20 of 24 (83.33%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
n/a
Score:
  7/10
Tags:
collection spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
outlook_office_path
outlook_win_path
Accesses Microsoft Outlook profiles
Reads WinSCP keys stored on the system
Reads user/profile data of web browsers
Unpacked files
SH256 hash:
8470f2e4915ba77bc8f071bc4c070fe0d87902ab69f9254c89d944dcf255e9a4
MD5 hash:
2bd1fbb03659105038a48c154736f0d3
SHA1 hash:
f01e4e908838991dc350dd5c1f55dc1c72a7f13c
SH256 hash:
0889c29532a90c0dc5c78adc53b97d9aef9e26e333cdcafb60c4282c9e68255f
MD5 hash:
322de4298484c385d0114c7c4f11ecf3
SHA1 hash:
b6c90187d5583d113b6fa460e66cec5b07fdc610
SH256 hash:
59238ef5d3377a6f798186b4b1e93b2da9f41a93d2e046019df99077f3d34e03
MD5 hash:
b89548984fdc018c8c586630f4728d00
SHA1 hash:
5be5bfab624f222bcee88eec754933505844d0f6
SH256 hash:
5eff63469fff981124eca685943116a6a89bc912e03cd7dba31edf2cd6569112
MD5 hash:
4ac989c7fdfbdee4e76c2c9677522cd3
SHA1 hash:
b024378eb23277e451fdb538243f4ad5077ac363
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high

Comments