MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 aa78693a6e988b4ef2cad9ea19dd2286f0d155efae6ffa27733036b9808ad3ad. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
PureLogsStealer
Vendor detections: 14
| SHA256 hash: | aa78693a6e988b4ef2cad9ea19dd2286f0d155efae6ffa27733036b9808ad3ad |
|---|---|
| SHA3-384 hash: | b1325faa05c88cafd4dba6ee115393b071c21044f0bbb23601db675489d073f9b3f0700c649fa437ba06d9d6cd7f4cb7 |
| SHA1 hash: | 604c7d8a9e13309781116276640173e021360227 |
| MD5 hash: | 1a375991d58112bec0fd13f12bb8bc32 |
| humanhash: | potato-johnny-may-red |
| File name: | yawcam.exe |
| Download: | download sample |
| Signature | PureLogsStealer |
| File size: | 5'331'648 bytes |
| First seen: | 2023-12-24 07:13:55 UTC |
| Last seen: | 2023-12-24 09:16:53 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'750 x AgentTesla, 19'653 x Formbook, 12'248 x SnakeKeylogger) |
| ssdeep | 98304:eGuQg5bvUHSSceVgQLCbrdYeWZjPwUKk8GLpEXgGoSvXBieI4r2aVkzH1:mbvUySceVgbbr3WZjPwKQHr3If6c |
| TLSH | T16036330E87E76A36EA3C663504B042812F77B09531C1E6A62CF0EACE15F77E64871F65 |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10523/12/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4505/5/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| File icon (PE): | |
| dhash icon | 70f0f0b0989ad870 (1 x PureLogsStealer, 1 x Formbook) |
| Reporter | |
| Tags: | exe PureLogStealer |
Intelligence
File Origin
# of uploads :
2
# of downloads :
315
Origin country :
ROVendor Threat Intelligence
Detection:
n/a
Detection(s):
Result
Verdict:
Malware
Maliciousness:
Behaviour
Sending a custom TCP request
Launching a process
Creating a file
Сreating synchronization primitives
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Using the Windows Management Instrumentation requests
Forced system process termination
Detecting VM
Unauthorized injection to a system process
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Tags:
installer overlay packed
Verdict:
Malicious
Labled as:
Trojan.Generic
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
FlashDevelop
Verdict:
Malicious
Result
Threat name:
PureLog Stealer, RHADAMANTHYS
Detection:
malicious
Classification:
troj.evad
Score:
92 / 100
Signature
.NET source code contains potential unpacker
Checks if the current machine is a virtual machine (disk enumeration)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Yara detected PureLog Stealer
Yara detected RHADAMANTHYS Stealer
Behaviour
Behavior Graph:
Score:
100%
Verdict:
Malware
File Type:
PE
Threat name:
Win32.Trojan.Nekark
Status:
Malicious
First seen:
2023-12-23 05:31:46 UTC
File Type:
PE (.Net Exe)
Extracted files:
19
AV detection:
17 of 37 (45.95%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Result
Malware family:
zgrat
Score:
10/10
Tags:
family:rhadamanthys family:zgrat rat stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of SetThreadContext
Detect ZGRat V1
Rhadamanthys
Suspicious use of NtCreateUserProcessOtherParentProcess
ZGRat
Unpacked files
SH256 hash:
ea14032287348acc73e75b6054569d3095d2fca5a738b0ad394d2abcad2d0153
MD5 hash:
eff923751c9c23308ca6d4c7ba349e97
SHA1 hash:
ef08df53086db936e7a4a86c8734e20431a46394
SH256 hash:
421fbd76454841ec3fce37daab84c71da4fdd8b24cef841a63a9c4b15f9bcd09
MD5 hash:
7c9e711db52565e0930c89c89ffadab1
SHA1 hash:
a18ebfeb958359f7b55022569125b8268372cc97
SH256 hash:
cf7a7b9a09c8b8438977763bdd74a234e73a10d000fc632b2ee3dbf070d97b03
MD5 hash:
c019ac83ba1026a4be382d59e54176d9
SHA1 hash:
47da12717bdb145fa97461d6c871771f27d2b25f
SH256 hash:
dfbda8f7c70af63985668c12cbc0a1f96f395cd8f7a92a175fb6aac57208490a
MD5 hash:
8e8e2700601b8a2e040e81a466eae94a
SHA1 hash:
033fd3452575bf354f6d1e4220dae16bf707f312
SH256 hash:
aa78693a6e988b4ef2cad9ea19dd2286f0d155efae6ffa27733036b9808ad3ad
MD5 hash:
1a375991d58112bec0fd13f12bb8bc32
SHA1 hash:
604c7d8a9e13309781116276640173e021360227
Detections:
INDICATOR_EXE_Packed_Babel
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.