MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cd58ff0d92eea20452fe4be4e4714e35226a5184bcac5cd49439d927130017dc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



PureLogsStealer


Vendor detections: 11


Intelligence 11 IOCs 1 YARA 5 File information Comments

SHA256 hash: cd58ff0d92eea20452fe4be4e4714e35226a5184bcac5cd49439d927130017dc
SHA3-384 hash: fbcd41756b7664499c6f0ee4bab1e1840fbe86de114879da3c544968f0f9c8c7e0893d4e0032dbae84f8cb9e05f372de
SHA1 hash: 9f18541f5f339dd6d68b6f3e98f855c9e813a55b
MD5 hash: 89785a2ce26ebbb9b7336ee6e0325b99
humanhash: rugby-victor-angel-minnesota
File name:PURCHASE INQUIRY FOR G M VALVE PVT. LTD.js
Download: download sample
Signature PureLogsStealer
File size:111'513 bytes
First seen:2026-01-15 07:10:15 UTC
Last seen:Never
File type:Java Script (JS) js
MIME type:text/plain
ssdeep 1536:WniV3jT0jqWarR4E6lIcZ4iUK/mUJUbyzMNVp3xG51Sl2r4whuEmmzXphfj+9Ig3:WiVsT15t4XExkoVrUR
TLSH T1E0B384C939CAF47343B935276D1BB05AF12F4D82760C80A4D2D766A8FE68708E635D2D
Magika javascript
Reporter abuse_ch
Tags:js PureLogsStealer


Avatar
abuse_ch
PureLogsStealer C2:
147.124.215.69:1991

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
147.124.215.69:1991 https://threatfox.abuse.ch/ioc/1732349/

Intelligence


File Origin
# of uploads :
1
# of downloads :
113
Origin country :
NL NL
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Score:
94.9%
Tags:
ransomware shell hype
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
aspnet_compiler base64 evasive lolbin masquerade obfuscated obfuscated opendir reconnaissance repaired
Verdict:
Malicious
Labled as:
SVM:TrojanDownloader/JS.Nemucod
Verdict:
Malicious
File Type:
js
First seen:
2026-01-14T21:02:00Z UTC
Last seen:
2026-01-16T04:15:00Z UTC
Hits:
~100
Detections:
PDM:Trojan.Win32.Generic Trojan-Downloader.JS.SLoad.sb Trojan.JS.SAgent.sb HEUR:Trojan-Downloader.Script.Generic Trojan-Downloader.Agent.HTTP.C&C Trojan-PSW.PureLogs.TCP.C&C Trojan.Win32.InjectorNetT.s
Result
Threat name:
PureLog Stealer
Detection:
malicious
Classification:
evad.troj.spyw.expl
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected malicious Powershell script
Allocates memory in foreign processes
Bypasses PowerShell execution policy
Creates a thread in another existing process (thread injection)
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
JScript performs obfuscated calls to suspicious functions
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Potential obfuscated javascript found
Sigma detected: Script Initiated Connection to Non-Local Network
Sigma detected: Suspicious PowerShell Parameter Substring
Sigma detected: WScript or CScript Dropper
Suricata IDS alerts for network traffic
Suspicious execution chain found
Switches to a custom stack to bypass stack traces
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Unusual module load detection (module proxying)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected Generic JS Downloader
Yara detected Powershell decode and execute
Yara detected PureLog Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1851069 Sample: PURCHASE INQUIRY FOR G M VA... Startdate: 15/01/2026 Architecture: WINDOWS Score: 100 70 googlehosted.l.googleusercontent.com 2->70 72 clients2.googleusercontent.com 2->72 94 Suricata IDS alerts for network traffic 2->94 96 Malicious sample detected (through community Yara rule) 2->96 98 Multi AV Scanner detection for submitted file 2->98 100 12 other signatures 2->100 10 wscript.exe 17 2->10         started        signatures3 process4 dnsIp5 76 45.144.212.54, 49776, 80 HPC-MVM-ASHU Ukraine 10->76 66 C:\Users\user\AppData\Local\...\ikmero[1].ps1, ASCII 10->66 dropped 68 C:\Temp\ZGYKUANF.ps1, ASCII 10->68 dropped 122 System process connects to network (likely due to code injection or exploit) 10->122 124 JScript performs obfuscated calls to suspicious functions 10->124 126 Wscript starts Powershell (via cmd or directly) 10->126 128 3 other signatures 10->128 15 powershell.exe 16 10->15         started        file6 signatures7 process8 signatures9 130 Writes to foreign memory regions 15->130 132 Injects a PE file into a foreign processes 15->132 18 aspnet_compiler.exe 4 15->18         started        22 aspnet_compiler.exe 15->22         started        24 aspnet_compiler.exe 3 15->24         started        26 26 other processes 15->26 process10 dnsIp11 74 147.124.215.69, 1991, 49777, 49808 AC-AS-1US United States 18->74 102 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 18->102 104 Tries to steal Mail credentials (via file / registry access) 18->104 106 Found many strings related to Crypto-Wallets (likely being stolen) 18->106 120 2 other signatures 18->120 28 chrome.exe 1 18->28         started        39 4 other processes 18->39 108 Tries to harvest and steal browser information (history, passwords, etc) 22->108 110 Writes to foreign memory regions 22->110 112 Allocates memory in foreign processes 22->112 41 2 other processes 22->41 114 Tries to harvest and steal Bitcoin Wallet information 24->114 116 Creates a thread in another existing process (thread injection) 24->116 118 Injects a PE file into a foreign processes 24->118 31 chrome.exe 24->31         started        43 5 other processes 24->43 33 chrome.exe 26->33         started        35 chrome.exe 26->35         started        37 chrome.exe 26->37         started        45 30 other processes 26->45 signatures12 process13 dnsIp14 78 192.168.11.20, 1991, 443, 49763 unknown unknown 28->78 47 chrome.exe 28->47         started        50 chrome.exe 31->50         started        52 chrome.exe 33->52         started        54 chrome.exe 35->54         started        56 chrome.exe 37->56         started        58 chrome.exe 41->58         started        60 chrome.exe 45->60         started        62 chrome.exe 45->62         started        64 14 other processes 45->64 process15 dnsIp16 80 googlehosted.l.googleusercontent.com 142.251.40.129, 443, 49771, 49772 GOOGLEUS United States 47->80 88 6 other IPs or domains 47->88 90 4 other IPs or domains 50->90 82 clients2.googleusercontent.com 56->82 84 clients2.googleusercontent.com 58->84 86 clients2.googleusercontent.com 60->86 92 6 other IPs or domains 64->92
Gathering data
Threat name:
Script-JS.Trojan.Heuristic
Status:
Malicious
First seen:
2026-01-15 03:03:03 UTC
File Type:
Text (JavaScript)
AV detection:
5 of 36 (13.89%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
collection discovery execution
Behaviour
Checks processor information in registry
Enumerates system info in registry
Modifies data under HKEY_USERS
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Browser Information Discovery
Command and Scripting Interpreter: JavaScript
Command and Scripting Interpreter: PowerShell
Enumerates physical storage devices
System Location Discovery: System Language Discovery
System Time Discovery
Drops file in Windows directory
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Checks computer location settings
Badlisted process makes network request
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NET
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments