MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ea0c1b448dfd94060600f75faab6f2bb929269cf1a6498859cff129353e5d7da. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



PureLogsStealer


Vendor detections: 15


Intelligence 15 IOCs YARA 5 File information Comments 1

SHA256 hash: ea0c1b448dfd94060600f75faab6f2bb929269cf1a6498859cff129353e5d7da
SHA3-384 hash: 4ccbdd490d609849c27d5eb880d3237ce6183d860481df959a267c5d1bdb24d35c60b8a315a6c8fa47e9aac356418cae
SHA1 hash: 1bd4ef476c54795c28cb3acbaa44b2fbc4abc9ee
MD5 hash: ff4188dc02e8d3dabea5b613c00d34cb
humanhash: hawaii-xray-sierra-happy
File name:ff4188dc02e8d3dabea5b613c00d34cb
Download: download sample
Signature PureLogsStealer
File size:3'377'152 bytes
First seen:2024-08-05 16:40:34 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'662 x AgentTesla, 19'476 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 49152:Fy6VlEbmYQ2gLOkmL35nZfmcb0Z7NANyu1DyTj9yMQoPwdCqp6aIrM1SI2ChbMTt:d5Okc35nlQN8y/JyQPHqp6Ribb2
TLSH T1D1F5128C2BA46E56D9DFE733DCF16969CF70E091B39BD30E34801AA51C45B868C8176B
TrID 60.4% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.8% (.SCR) Windows screen saver (13097/50/3)
8.7% (.EXE) Win64 Executable (generic) (10523/12/4)
5.4% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.1% (.EXE) Win16 NE executable (generic) (5038/12/1)
Reporter zbetcheckin
Tags:32 exe PureLogStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
346
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
ff4188dc02e8d3dabea5b613c00d34cb
Verdict:
Malicious activity
Analysis date:
2024-08-05 16:43:37 UTC
Tags:
purecrypter purelogs netreactor stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
92.5%
Tags:
Network Stealth
Result
Verdict:
Malware
Maliciousness:

Behaviour
Unauthorized injection to a recently created process
Restart of the analyzed sample
Creating a process with a hidden window
Сreating synchronization primitives
Connection attempt
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Creating a window
Creating a file in the %temp% directory
Reading critical registry keys
Creating a file
Stealing user critical data
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
macros-on-open obfuscated packed packed smartassembly smart_assembly
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
PureLog Stealer, zgRAT
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
AI detected suspicious sample
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Yara detected AntiVM3
Yara detected Costura Assembly Loader
Yara detected PureLog Stealer
Yara detected zgRAT
Behaviour
Behavior Graph:
Threat name:
Win32.Infostealer.Tinba
Status:
Malicious
First seen:
2024-08-05 15:38:49 UTC
File Type:
PE (.Net Exe)
Extracted files:
1
AV detection:
19 of 24 (79.17%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
n/a
Score:
  9/10
Tags:
collection credential_access discovery spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Browser Information Discovery
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Reads WinSCP keys stored on the system
Reads user/profile data of web browsers
Credentials from Password Stores: Credentials from Web Browsers
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
69657ad97a805632de9aa17c9e5c398e2107eaa1e6f571e67a8c8bef9ba3ef32
MD5 hash:
d47d2e0cbc9cec8ad07a7675e135b607
SHA1 hash:
ddb8ce57f2f2f391dd5e390d21d46adf83edb3ac
SH256 hash:
d36c09d9ecb069d66f9bc65be5d98ba7eea2d3e65d3b1bd9fdd5e9848611723c
MD5 hash:
ba28b3c85f430674db99608c626249c0
SHA1 hash:
2d0ac4af9074b577ff6583e86894edcf1aa6130c
Detections:
SUSP_OBF_NET_Reactor_Indicators_Jan24
SH256 hash:
ef85e16c1f1bb0bf95c3e094519bebf2e532e339612eb7845296d7daaa39d170
MD5 hash:
0636f03ea589130051ed306f7852c021
SHA1 hash:
7e379a83e38a66409551f8cc0a329a5ec7273060
SH256 hash:
bbd8e23ee80181a42f6b9975f6e62639112a2c6cfa9b193fac15298d242f8f1c
MD5 hash:
54791295a52c3f46a87cad34cfd49089
SHA1 hash:
5379445c8b5ea528139d2b4cb6b37820cacd929c
SH256 hash:
19efdf03cb94895935225795f68bb9abfded1869687367013b8b4eee3cc99372
MD5 hash:
4e29f75c0c51b9dec76955f0382d9541
SHA1 hash:
4899aa8e3f57339cbaec8faab777897a76fe1c3a
SH256 hash:
78f73e1734daa918b253517c75971fbb8df773a3d77d02a752e9a0ad1711a677
MD5 hash:
f9d2985aa1c41cca281321fffb5ed424
SHA1 hash:
3a7a58d2dcae2762882357ae34d372744b1dbb9d
SH256 hash:
1f3a8f2ecd2239ca7f4e0212d7e3a952fc44095c61e9b462874563961ef23805
MD5 hash:
ee0d280de80d594229b4d7fc57d89aeb
SHA1 hash:
0681b3faa4dc81c9371a79d9151537f9fe377892
Detections:
SUSP_OBF_NET_Reactor_Indicators_Jan24
SH256 hash:
32a2e4e3b0f769020ddb02237a0f14a1cd14fb2c9a6e95bb0ebbae19be82cc8e
MD5 hash:
9669d77dddad133eeafd7325319b7cd2
SHA1 hash:
02cef901c372dbad428350d2bd26bd2c4289050b
SH256 hash:
ea0c1b448dfd94060600f75faab6f2bb929269cf1a6498859cff129353e5d7da
MD5 hash:
ff4188dc02e8d3dabea5b613c00d34cb
SHA1 hash:
1bd4ef476c54795c28cb3acbaa44b2fbc4abc9ee
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_SmartAssembly
Author:ditekSHen
Description:Detects executables packed with SmartAssembly
Rule name:NET
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

PureLogsStealer

Executable exe ea0c1b448dfd94060600f75faab6f2bb929269cf1a6498859cff129353e5d7da

(this sample)

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (GUARD_CF)high

Comments



Avatar
zbet commented on 2024-08-05 16:40:35 UTC

url : hxxp://91.200.100.86/mtx111.exe