MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a319864b27cc93f963d4418f363bc01aecf4d45f77730ac70d619deaad9423b2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



PureLogsStealer


Vendor detections: 15


Intelligence 15 IOCs YARA 4 File information Comments

SHA256 hash: a319864b27cc93f963d4418f363bc01aecf4d45f77730ac70d619deaad9423b2
SHA3-384 hash: ef8a1fe829eb057b1bae5057ba9dc8f5b2224f6f6996faca7957cb1dea51a0dd6f38ae96b80a7c6fa09c490fa9d2b4e7
SHA1 hash: eead247f58fc08752f9bcf24a2a52d0929c87d9a
MD5 hash: b160df9e77172171aea902d5b62d0af1
humanhash: winner-pennsylvania-harry-princess
File name:file
Download: download sample
Signature PureLogsStealer
File size:4'563'968 bytes
First seen:2024-04-23 19:33:57 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 98304:+fqS/OcalzVE18TvA/R6rKUlDy6pifBiVXCYtmrMY36cd:+foxm8b2R6rKUfKBHYEMbcd
Threatray 743 similar samples on MalwareBazaar
TLSH T12B2633927A43E820C52C8E74C8DB518251B1CC48D583DB6BB5D57B6F2E373D4AB0BA87
TrID 67.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
9.7% (.EXE) Win64 Executable (generic) (10523/12/4)
6.0% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
4.1% (.EXE) Win32 Executable (generic) (4504/4/1)
File icon (PE):PE icon
dhash icon 30ccec30b2b23010 (2 x PureLogsStealer, 1 x njrat, 1 x zgRAT)
Reporter jstrosch
Tags:.NET exe MSIL PureLogStealer


Avatar
jstrosch
Found at hxxp://77.221.151[.]42/files/new.exe by #subcrawl

Intelligence


File Origin
# of uploads :
1
# of downloads :
371
Origin country :
US US
Vendor Threat Intelligence
Malware family:
asyncrat
ID:
1
File name:
a319864b27cc93f963d4418f363bc01aecf4d45f77730ac70d619deaad9423b2.exe
Verdict:
Malicious activity
Analysis date:
2024-04-24 05:19:09 UTC
Tags:
rat asyncrat remote

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Сreating synchronization primitives
Launching a process
Creating a process with a hidden window
Creating a file in the %AppData% directory
Creating a file
Using the Windows Management Instrumentation requests
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a system process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
obfuscated packed packed smartassembly smart_assembly
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
PureLog Stealer, zgRAT
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Encrypted powershell cmdline option found
Found many strings related to Crypto-Wallets (likely being stolen)
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Bitcoin Wallet information
Yara detected AntiVM3
Yara detected Costura Assembly Loader
Yara detected PureLog Stealer
Yara detected zgRAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1430547 Sample: file.exe Startdate: 23/04/2024 Architecture: WINDOWS Score: 100 43 Snort IDS alert for network traffic 2->43 45 Malicious sample detected (through community Yara rule) 2->45 47 Antivirus detection for URL or domain 2->47 49 9 other signatures 2->49 7 file.exe 1 4 2->7         started        11 WindowsDefender.exe 1 2->11         started        13 WindowsDefender.exe 2->13         started        process3 file4 29 C:\Users\user\AppData\...\WindowsDefender.exe, PE32 7->29 dropped 51 Found many strings related to Crypto-Wallets (likely being stolen) 7->51 53 Encrypted powershell cmdline option found 7->53 55 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 7->55 15 InstallUtil.exe 1 2 7->15         started        19 powershell.exe 23 7->19         started        57 Antivirus detection for dropped file 11->57 59 Multi AV Scanner detection for dropped file 11->59 61 Machine Learning detection for dropped file 11->61 21 InstallUtil.exe 11->21         started        23 InstallUtil.exe 13->23         started        signatures5 process6 dnsIp7 31 77.221.151.42, 49711, 49717, 56001 INFOBOX-ASInfoboxruAutonomousSystemRU Russian Federation 15->31 33 Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines) 15->33 35 Found many strings related to Crypto-Wallets (likely being stolen) 15->35 37 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 15->37 41 3 other signatures 15->41 39 Loading BitLocker PowerShell Module 19->39 25 WmiPrvSE.exe 19->25         started        27 conhost.exe 19->27         started        signatures8 process9
Threat name:
ByteCode-MSIL.Trojan.Injuke
Status:
Malicious
First seen:
2024-04-23 19:34:06 UTC
File Type:
PE (.Net Exe)
Extracted files:
19
AV detection:
17 of 24 (70.83%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:zgrat persistence rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Adds Run key to start application
Checks computer location settings
Detect ZGRat V1
ZGRat
Unpacked files
SH256 hash:
a8d6efc31801cb356e9a90bb76e40eace83321bc5aa682fc327495ab3a993083
MD5 hash:
bcb50890042ade4c76c21970ec91f8ff
SHA1 hash:
e2d57adef44b59c9e345bd918604043b9152e1fc
SH256 hash:
e2136176b289f8fe841960ed2e4ff7158c37e18298a915232b8777da3e543203
MD5 hash:
eec1b003b6c421b32bd21d7d9b68b1e8
SHA1 hash:
0eaaed4aa590cca0574958fd31ce0b7eb75f7865
SH256 hash:
a319864b27cc93f963d4418f363bc01aecf4d45f77730ac70d619deaad9423b2
MD5 hash:
b160df9e77172171aea902d5b62d0af1
SHA1 hash:
eead247f58fc08752f9bcf24a2a52d0929c87d9a
Detections:
INDICATOR_EXE_Packed_SmartAssembly
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_SmartAssembly
Author:ditekSHen
Description:Detects executables packed with SmartAssembly
Rule name:NET
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

PureLogsStealer

Executable exe a319864b27cc93f963d4418f363bc01aecf4d45f77730ac70d619deaad9423b2

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (GUARD_CF)high

Comments