MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 655e29e5da8c222d74b593803889cd10c1b9ab70148849d1f713e5bc11c3f2b5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



PureLogsStealer


Vendor detections: 9


Intelligence 9 IOCs YARA 5 File information Comments

SHA256 hash: 655e29e5da8c222d74b593803889cd10c1b9ab70148849d1f713e5bc11c3f2b5
SHA3-384 hash: d80938cf3624441c5bde0daa2571a6043b93307d147e6cdb1f110ae5f6c9677a5dac9f401214cd7dc994f4a6d04b199d
SHA1 hash: 3a57522ef782aba46284385ed7622613d796ae77
MD5 hash: fe6456b3e1b2c4b994f1344583b136ae
humanhash: pennsylvania-sad-oregon-cola
File name:REQUEST FOR QUOTATION (RFQ)-124425.scr.gz
Download: download sample
Signature PureLogsStealer
File size:11'596 bytes
First seen:2024-07-24 07:58:28 UTC
Last seen:Never
File type: gz
MIME type:application/gzip
ssdeep 192:JEfnQ3WXLdlD8GYYoo8i+y9R4nMQw1ksjxUcnWzpNV6WhEA7+tCLILfK+vl0ZEt:JcnQ3cj81w8ixR4WksSyQfdEIFLI3lN
TLSH T16E32BFA00EC3977B535ED1C2DFBDBA592D0605BED1B2074325C4CA8748E61AF1CC8E26
Reporter cocaman
Tags:gz PureLogStealer QUOTATION RFQ


Avatar
cocaman
Malicious email (T1566.001)
From: "HUSSAINI BIN ZAILANI <romy@jmontalto.com>" (likely spoofed)
Received: "from fresh.jmontalto.com (fresh.jmontalto.com [193.25.216.151]) "
Date: "24 Jul 2024 07:58:06 -0700"
Subject: "REQUEST FOR QUOTATION (RFQ)-124425"
Attachment: "REQUEST FOR QUOTATION (RFQ)-124425.scr.gz"

Intelligence


File Origin
# of uploads :
1
# of downloads :
81
Origin country :
CH CH
File Archive Information

This file archive contains 2 file(s), sorted by their relevance:

File name:32512
File size:20 bytes
SHA256 hash: 946a3e6ff60bc529089f9aed7e933b5915e4971f120b9eb04cfcdf964470836f
MD5 hash: 630f28963937ba5145fa1e1dc15c8fc1
MIME type:application/octet-stream
Signature PureLogsStealer
File name:REQUEST FOR QUOTATION (RFQ)-124425.scr
File size:24'064 bytes
SHA256 hash: 5c415a3f7d2dfc912447dfde68e67c6b90cc0fd07011f8bd062390ad72111609
MD5 hash: 13b563870ec11bf24082a47c0ffa12e3
MIME type:application/x-dosexec
Signature PureLogStealer
Vendor Threat Intelligence
Verdict:
Malicious
Score:
96.5%
Tags:
Execution Network Stealth
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
net_reactor packed
Result
Verdict:
MALICIOUS
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2024-07-24 07:58:30 UTC
File Type:
Binary (Archive)
Extracted files:
4
AV detection:
16 of 24 (66.67%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
discovery
Behaviour
Delays execution with timeout.exe
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Checks computer location settings
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

PureLogStealer

gz 655e29e5da8c222d74b593803889cd10c1b9ab70148849d1f713e5bc11c3f2b5

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments