MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 65ce0178ab30e4a96ce574b7559ca01bd9f114f0605a5be6e0284256f88d83e5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



PureLogsStealer


Vendor detections: 9


Intelligence 9 IOCs YARA 2 File information Comments

SHA256 hash: 65ce0178ab30e4a96ce574b7559ca01bd9f114f0605a5be6e0284256f88d83e5
SHA3-384 hash: 925b879941c16e1e390f312404f3cfda6c285888c948c9b82009aab6957f3bfe0677643784408f4164659198773685da
SHA1 hash: e279a9a66279563371c5ca75307dd2fccb6fbea9
MD5 hash: 6c765f0ac9b22e095aec0c5a23d4c6c2
humanhash: alpha-east-football-south
File name:KJ-103Swift-CN8400-GF4022-PL0039-YF4893-CHF849-JDE0003-EA392-KS9400-LAWIW.001
Download: download sample
Signature PureLogsStealer
File size:440'020 bytes
First seen:2025-12-09 09:25:30 UTC
Last seen:Never
File type: rar
MIME type:application/x-rar
ssdeep 12288:tTKMZrj8TIVaHIRPspUirRiH/l56vyEqL4AWxQC:hKMZrjUIGI1uUGyl5iyECVC
TLSH T100942332A561843BF35484B3FC3BDE94450664CC4AD425961BAF9A523F4A2E0E3F8FC9
TrID 61.5% (.RAR) RAR compressed archive (v5.0) (8000/1)
38.4% (.RAR) RAR compressed archive (gen) (5000/1)
Magika rar
Reporter cocaman
Tags:001 PureLogsStealer rar SWIFT


Avatar
cocaman
Malicious email (T1566.001)
From: "Evelore von Quernheim <Evelore@yankion.com>" (likely spoofed)
Received: "from mail.yankion.com (mail.yankion.com [23.254.209.184]) "
Date: "9 Dec 2025 06:25:45 +0100"
Subject: "CN117"
Attachment: "KJ-103Swift-CN8400-GF4022-PL0039-YF4893-CHF849-JDE0003-EA392-KS9400-LAWIW.001"

Intelligence


File Origin
# of uploads :
1
# of downloads :
67
Origin country :
CH CH
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:KJ-103Swift-CN8400-GF4022-PL0039-YF4893-CHF849-JDE0003-EA392-KS9400-LAWIW.exe
File size:587'264 bytes
SHA256 hash: fa83fdb373d067023293567d76ee94ce0a4b592e6193c58025b7725dda06fc60
MD5 hash: 49382279198b796663f0a88dc9e634df
MIME type:application/x-dosexec
Signature PureLogsStealer
Vendor Threat Intelligence
Verdict:
Malicious
Score:
92.5%
Tags:
injection obfusc virus
Verdict:
Unknown
Threat level:
  2.5/10
Confidence:
100%
Tags:
adaptive-context anti-debug blackhole installer installer installer-heuristic microsoft_visual_cc nsis overlay signed
Verdict:
Malicious
File Type:
rar
First seen:
2025-12-10T01:38:00Z UTC
Last seen:
2025-12-10T01:48:00Z UTC
Hits:
~10
Verdict:
inconclusive
YARA:
1 match(es)
Tags:
Executable PE (Portable Executable) PE File Layout Rar Archive
Threat name:
Win32.Trojan.GuLoader
Status:
Malicious
First seen:
2025-12-09 04:24:25 UTC
File Type:
Binary (Archive)
Extracted files:
22
AV detection:
18 of 38 (47.37%)
Threat level:
  5/5
Result
Malware family:
guloader
Score:
  10/10
Tags:
family:guloader collection discovery downloader persistence spyware stealer
Behaviour
Enumerates system info in registry
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Browser Information Discovery
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Windows directory
Drops file in System32 directory
Suspicious use of NtCreateThreadExHideFromDebugger
Suspicious use of NtSetInformationThreadHideFromDebugger
Accesses Microsoft Outlook profiles
Adds Run key to start application
Loads dropped DLL
Reads WinSCP keys stored on the system
Reads user/profile data of web browsers
Guloader family
Guloader,Cloudeye
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Detect_NSIS_Nullsoft_Installer
Author:Obscurity Labs LLC
Description:Detects NSIS installers by .ndata section + NSIS header string
Rule name:PE_Digital_Certificate
Author:albertzsigovits

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

PureLogsStealer

rar 65ce0178ab30e4a96ce574b7559ca01bd9f114f0605a5be6e0284256f88d83e5

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments