MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f051ccaa5bc22f73cd8fa340f40f102bb0372684c6f3a5160c43fe7211cf1d25. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



PureLogsStealer


Vendor detections: 15


Intelligence 15 IOCs YARA 3 File information Comments

SHA256 hash: f051ccaa5bc22f73cd8fa340f40f102bb0372684c6f3a5160c43fe7211cf1d25
SHA3-384 hash: c8f1be796321570f4da03feaf0b83a6be85461cf2a9402ff98232ed5a06b529dc348aa7f327fde13d1dce05cb62f56ce
SHA1 hash: b3cbc47bdc7a22c1c07b65cc000992b18546cb49
MD5 hash: 83cc5dd2d994c441c1aba8d003b4e78a
humanhash: alanine-idaho-oklahoma-charlie
File name:SecuriteInfo.com.Win32.MalwareX-gen.32621.18232
Download: download sample
Signature PureLogsStealer
File size:745'472 bytes
First seen:2026-01-07 07:23:36 UTC
Last seen:2026-01-07 08:22:49 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'795 x AgentTesla, 19'693 x Formbook, 12'274 x SnakeKeylogger)
ssdeep 12288:tra4ctN7IBWXWWbZiHW3s9ZNleQ/Qr7k0uTOqz+kdaOX8WSfqzv:traTrIkZCW3sXNlehr7vuTOWaOXtSfI
Threatray 18 similar samples on MalwareBazaar
TLSH T1CCF40218120ADC02C5D24FB6A9B1D3B03B246EEBA9D1D7A39FD93FDF74296D15980381
TrID 69.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.0% (.EXE) Win64 Executable (generic) (10522/11/4)
6.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.2% (.EXE) Win32 Executable (generic) (4504/4/1)
1.9% (.EXE) Win16/32 Executable Delphi generic (2072/23)
Magika pebin
Reporter SecuriteInfoCom
Tags:exe PureLogsStealer

Intelligence


File Origin
# of uploads :
2
# of downloads :
161
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
SecuriteInfo.com.Win32.MalwareX-gen.32621.18232
Verdict:
Malicious activity
Analysis date:
2026-01-07 07:26:27 UTC
Tags:
stealer purecrypter purehvnc netreactor

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
81.4%
Tags:
backdoor nanobot
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Restart of the analyzed sample
Creating a file
Сreating synchronization primitives
Connection attempt
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
davinci formbook krypt packed
Verdict:
Malicious
File Type:
exe x32
First seen:
2026-01-07T01:05:00Z UTC
Last seen:
2026-01-09T01:12:00Z UTC
Hits:
~1000
Verdict:
inconclusive
YARA:
10 match(es)
Tags:
.Net Executable Managed .NET PDB Path PE (Portable Executable) PE File Layout SOS: 0.28 Win 32 Exe x86
Threat name:
ByteCode-MSIL.Spyware.Negasteal
Status:
Suspicious
First seen:
2026-01-07 05:32:44 UTC
File Type:
PE (.Net Exe)
Extracted files:
6
AV detection:
10 of 24 (41.67%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
collection discovery spyware stealer
Behaviour
Checks processor information in registry
Enumerates system info in registry
Modifies data under HKEY_USERS
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Browser Information Discovery
System Location Discovery: System Language Discovery
System Time Discovery
Drops file in Program Files directory
Drops file in Windows directory
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Reads WinSCP keys stored on the system
Reads user/profile data of web browsers
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
f051ccaa5bc22f73cd8fa340f40f102bb0372684c6f3a5160c43fe7211cf1d25
MD5 hash:
83cc5dd2d994c441c1aba8d003b4e78a
SHA1 hash:
b3cbc47bdc7a22c1c07b65cc000992b18546cb49
SH256 hash:
22118ccbfa8f465ccc450de8ea1bc6383d171384e6fa87d8a2336739275dd7c6
MD5 hash:
508b96b663315949ab0aaab7a9f8322f
SHA1 hash:
101ef2e916699820f34551102a2a57d050423ad1
SH256 hash:
f705bc429bb31da8c395272caa0fbf4b7e963c94dfdfd68159c0c263278aea69
MD5 hash:
4a8b432fb543490468a525ee1829cefc
SHA1 hash:
2d99f6248a8201084694b587ab1812f1e99b2cf6
SH256 hash:
a0e868b700bc373aa7daca176b2cd3ea7b7eac2c34c279672a0397e4e54c5c61
MD5 hash:
21c129f6067037b5d95f866ea8bf40ac
SHA1 hash:
b8a65842e9c2082fcc3c2b1c9e1603b85ad7ccbe
Detections:
SUSP_OBF_NET_ConfuserEx_Name_Pattern_Jan24 SUSP_OBF_NET_Reactor_Indicators_Jan24
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NET
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments