MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c886e938dd26ca17bd29feea36d4c487483bb05d86b3c382e045b88925b27149. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



PureLogsStealer


Vendor detections: 14


Intelligence 14 IOCs YARA 4 File information Comments 1

SHA256 hash: c886e938dd26ca17bd29feea36d4c487483bb05d86b3c382e045b88925b27149
SHA3-384 hash: 059528fe227e145d2d3766f5cc339a9f7a1c511cd58efaa54004486df3ed4eabb35b6382ad6aa440b1a78ffb042e0d3f
SHA1 hash: 93a70b449926995d458b9513b8b36e988f73dc8a
MD5 hash: ac15ae1e49f4272e8d38b5fd5573ce35
humanhash: river-carolina-vegan-eight
File name:ac15ae1e49f4272e8d38b5fd5573ce35
Download: download sample
Signature PureLogsStealer
File size:83'456 bytes
First seen:2024-01-30 03:54:45 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 1536:D7Vs/tSdQLcSjAA0C0rEr2ofgNTX0g/+PmN/10BmglZqiqazVkP5tJCFPzRUR2lX:D5MmQLcxAarEDINTD/+Pmn0BmgnpzmcP
Threatray 4 similar samples on MalwareBazaar
TLSH T144836C0CAB8DBB27C6AD0B7B90E2724247B885B2677BF35B68C4419548733E75493B43
TrID 67.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
9.7% (.EXE) Win64 Executable (generic) (10523/12/4)
6.0% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
4.1% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter zbetcheckin
Tags:32 exe PureLogStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
282
Origin country :
FR FR
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
DNS request
Sending a custom TCP request
Restart of the analyzed sample
Creating a file
Creating a window
Creating a file in the %temp% directory
Creating a process from a recently created file
Searching for the window
Using the Windows Management Instrumentation requests
Enabling the 'hidden' option for files in the %temp% directory
Launching the default Windows debugger (dwwin.exe)
Running batch commands
Unauthorized injection to a recently created process
Enabling autorun by creating a file
Verdict:
No Threat
Threat level:
  10/10
Confidence:
100%
Tags:
obfuscated packed packed smartassembly smart_assembly
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Stealerium Stealer
Verdict:
Malicious
Result
Threat name:
PureLog Stealer, Stealerium
Detection:
malicious
Classification:
rans.troj.adwa.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to capture screen (.Net source)
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to log keystrokes (.Net Source)
Drops PE files to the startup folder
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies existing user documents (likely ransomware behavior)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Capture Wi-Fi password
Sigma detected: Suspicious Process Patterns NTDS.DIT Exfil
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal WLAN passwords
Uses netsh to modify the Windows network and firewall settings
Uses the Telegram API (likely for C&C communication)
Yara detected Costura Assembly Loader
Yara detected Generic Downloader
Yara detected PureLog Stealer
Yara detected Stealerium
Yara detected Telegram RAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1383110 Sample: lgmhTjGbk0.exe Startdate: 30/01/2024 Architecture: WINDOWS Score: 100 75 api.telegram.org 2->75 77 75.103.13.0.in-addr.arpa 2->77 79 6 other IPs or domains 2->79 99 Found malware configuration 2->99 101 Malicious sample detected (through community Yara rule) 2->101 103 Antivirus detection for URL or domain 2->103 107 15 other signatures 2->107 11 lgmhTjGbk0.exe 15 3 2->11         started        15 msiexec.exe 2->15         started        17 Microsoft Windows Update.exe 2->17         started        signatures3 105 Uses the Telegram API (likely for C&C communication) 75->105 process4 dnsIp5 81 magic.poisontoolz.com 104.21.10.90, 443, 49703 CLOUDFLARENETUS United States 11->81 111 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 11->111 113 Injects a PE file into a foreign processes 11->113 19 lgmhTjGbk0.exe 7 11->19         started        23 lgmhTjGbk0.exe 11->23         started        25 lgmhTjGbk0.exe 11->25         started        signatures6 process7 file8 59 C:\Users\user\AppData\Local\Temp\build.exe, PE32 19->59 dropped 61 C:\Users\user\AppData\Local\Temp\@dr@m@.exe, PE32 19->61 dropped 109 Found many strings related to Crypto-Wallets (likely being stolen) 19->109 27 build.exe 14 130 19->27         started        32 @dr@m@.exe 14 13 19->32         started        signatures9 process10 dnsIp11 83 api.gofile.io 51.38.43.18, 443, 49732 OVHFR France 27->83 85 store16.gofile.io 104.36.23.21, 443, 49735 ICASTCENTERUS United States 27->85 91 2 other IPs or domains 27->91 63 C:\Users\user\AppData\...\WSHEJMDVQC.docx, ASCII 27->63 dropped 65 C:\Users\user\AppData\...\SNIPGPPREP.jpg, ASCII 27->65 dropped 67 C:\Users\user\AppData\...\HQJBRDYKDE.png, ASCII 27->67 dropped 69 C:\Users\user\...\DotNetZip-iesie5jh.tmp, Zip 27->69 dropped 115 Antivirus detection for dropped file 27->115 117 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 27->117 119 Machine Learning detection for dropped file 27->119 129 4 other signatures 27->129 34 cmd.exe 27->34         started        37 cmd.exe 27->37         started        87 ip-api.com 208.95.112.1, 49733, 80 TUT-ASUS United States 32->87 89 api.telegram.org 149.154.167.220, 443, 49734 TELEGRAMRU United Kingdom 32->89 71 C:\Users\...\Microsoft Windows Update.exe, PE32 32->71 dropped 73 C:\Users\user\AppData\Local\...\CamSnap.exe, PE32 32->73 dropped 121 Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines) 32->121 123 Drops PE files to the startup folder 32->123 125 Tries to harvest and steal browser information (history, passwords, etc) 32->125 127 Queries memory information (via WMI often done to detect virtual machines) 32->127 39 CamSnap.exe 32->39         started        file12 signatures13 process14 signatures15 93 Uses netsh to modify the Windows network and firewall settings 34->93 95 Tries to harvest and steal WLAN passwords 34->95 41 chcp.com 34->41         started        43 conhost.exe 34->43         started        45 netsh.exe 34->45         started        47 findstr.exe 34->47         started        49 conhost.exe 37->49         started        51 chcp.com 37->51         started        53 netsh.exe 37->53         started        97 Multi AV Scanner detection for dropped file 39->97 55 WerFault.exe 39->55         started        process16 process17 57 conhost.exe 41->57         started       
Threat name:
ByteCode-MSIL.Trojan.Amadey
Status:
Malicious
First seen:
2024-01-30 03:55:07 UTC
File Type:
PE (.Net Exe)
Extracted files:
1
AV detection:
22 of 23 (95.65%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:stealerium family:zgrat collection rat spyware stealer
Behaviour
Checks processor information in registry
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Looks up external IP address via web service
Checks computer location settings
Drops startup file
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Detect ZGRat V1
Stealerium
ZGRat
Malware Config
C2 Extraction:
https://discordapp.com/api/webhooks/1197850806213431377/-zU9uA2NeaYEk4-ozdhgmNljI6NS_w_qcT_cbtxYxZdkUD3JeaKChZp4GXdod-MX3D1Q
Unpacked files
SH256 hash:
c886e938dd26ca17bd29feea36d4c487483bb05d86b3c382e045b88925b27149
MD5 hash:
ac15ae1e49f4272e8d38b5fd5573ce35
SHA1 hash:
93a70b449926995d458b9513b8b36e988f73dc8a
Detections:
INDICATOR_EXE_Packed_SmartAssembly
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_SmartAssembly
Author:ditekSHen
Description:Detects executables packed with SmartAssembly
Rule name:NET
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

PureLogsStealer

Executable exe c886e938dd26ca17bd29feea36d4c487483bb05d86b3c382e045b88925b27149

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2024-01-30 03:54:46 UTC

url : hxxp://magic.poisontoolz.com/%40dramo%40.exe