MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f98cf9ee6e3f42fe35ec570b4728ecd65929ba24ba4c090c3b438c8de4677cc8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



PureLogsStealer


Vendor detections: 16


Intelligence 16 IOCs YARA 12 File information Comments 1

SHA256 hash: f98cf9ee6e3f42fe35ec570b4728ecd65929ba24ba4c090c3b438c8de4677cc8
SHA3-384 hash: e71929876a7fc06aac195512fe8fa3c4e18d02db4ca9fd5239d8746113b848a0c0d8035277a9080bb844653d79eaa183
SHA1 hash: 9b0c4fb56039aec31aa12e8f7d6371ac6e8667ff
MD5 hash: c0bd0765626bdb60acd2d0dbb25b8f2c
humanhash: mobile-spaghetti-butter-foxtrot
File name:c0bd0765626bdb60acd2d0dbb25b8f2c
Download: download sample
Signature PureLogsStealer
File size:1'565'184 bytes
First seen:2024-01-07 23:14:19 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'744 x AgentTesla, 19'611 x Formbook, 12'242 x SnakeKeylogger)
ssdeep 24576:bPdTObqOtSZRPPdv8YzHJHiaIp6Py6jU0r9FBPDl10uMO7oFc4FNeNCKj12evl:DdTgqOGLzH8y66YGFxDlauMWoO20kEQ
Threatray 1 similar samples on MalwareBazaar
TLSH T1AA75014A5BA72555D4E94B7BC4DAAB26C3F49141AB8FE31B20C84DBA1C23F93D40760F
TrID 67.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
9.7% (.EXE) Win64 Executable (generic) (10523/12/4)
6.0% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
4.1% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter zbetcheckin
Tags:32 exe PureLog

Intelligence


File Origin
# of uploads :
1
# of downloads :
331
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
4Vx125AV.exe
Verdict:
Malicious activity
Analysis date:
2024-01-07 18:13:10 UTC
Tags:
amadey botnet stealer loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %AppData% directory
Unauthorized injection to a recently created process
Restart of the analyzed sample
Creating a file
Сreating synchronization primitives
DNS request
Sending an HTTP GET request
Using the Windows Management Instrumentation requests
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
obfuscated packed packed smartassembly smart_assembly
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
PureLog Stealer
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus / Scanner detection for submitted sample
Contain functionality to detect virtual machines
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to prevent local Windows debugging
Injects a PE file into a foreign processes
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Query firmware table information (likely to detect VMs)
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected Costura Assembly Loader
Yara detected PureLog Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1370986 Sample: Jw45oL7Dqh.exe Startdate: 08/01/2024 Architecture: WINDOWS Score: 100 27 ruspyc.top 2->27 35 Snort IDS alert for network traffic 2->35 37 Multi AV Scanner detection for domain / URL 2->37 39 Antivirus / Scanner detection for submitted sample 2->39 41 6 other signatures 2->41 7 Jw45oL7Dqh.exe 1 5 2->7         started        11 JavaJRE_Update_Sch.exe 5 2->11         started        13 JavaJRE_Update_Sch.exe 4 2->13         started        signatures3 process4 file5 25 C:\Users\user\...\JavaJRE_Update_Sch.exe, PE32 7->25 dropped 43 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 7->43 45 Injects a PE file into a foreign processes 7->45 47 Contains functionality to prevent local Windows debugging 7->47 49 Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent) 7->49 15 Jw45oL7Dqh.exe 65 7->15         started        51 Multi AV Scanner detection for dropped file 11->51 53 Contain functionality to detect virtual machines 11->53 19 JavaJRE_Update_Sch.exe 11->19         started        21 JavaJRE_Update_Sch.exe 11->21         started        23 JavaJRE_Update_Sch.exe 13->23         started        signatures6 process7 dnsIp8 29 ruspyc.top 91.92.241.244, 49705, 49706, 49714 THEZONEBG Bulgaria 15->29 31 Query firmware table information (likely to detect VMs) 15->31 33 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 15->33 signatures9
Threat name:
Win32.Trojan.CrypterX
Status:
Malicious
First seen:
2024-01-07 18:47:09 UTC
File Type:
PE (.Net Exe)
Extracted files:
1
AV detection:
13 of 37 (35.14%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:zgrat discovery evasion persistence rat
Behaviour
Checks processor information in registry
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Checks for VirtualBox DLLs, possible anti-VM trick
Suspicious use of SetThreadContext
Adds Run key to start application
Checks installed software on the system
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Looks for VirtualBox Guest Additions in registry
Detect ZGRat V1
ZGRat
Unpacked files
SH256 hash:
a8f1e5d7d4c35b697534836c9fcbfc22f91c61180d4e67d85b70747692c1c72e
MD5 hash:
bebbbd0e2a34054ca3fe5c3975330e5e
SHA1 hash:
f82ff6722c696172ed74163ba781a48fcc62a453
SH256 hash:
45a175639e5fda88324be5b2fa09b375338dda650e01402132cf698c1c8786db
MD5 hash:
a9d8831b29e64d67b456d7fffdaa5a89
SHA1 hash:
cbb729f37dadb61ba1d8b00b5835ec310e079f2a
SH256 hash:
4906a54c920e92ca20d1b4ab6980ce1be8fccff10af1791bd883e62cbacfc668
MD5 hash:
794cd6cc8f0725efe1e85dcbd2092809
SHA1 hash:
c8269f39dc6abe977ea64165d92292d1f439aaac
SH256 hash:
7286e0063f6f76309d4644bdcb3fb93e4c280459000b0ed204c4cd2c81b49684
MD5 hash:
6e9ba96ed3133cf9bd7ce78b4e98b009
SHA1 hash:
7ae6f3bd51fbce4ad7ac9cdc1ca63a5c46dc42ae
Detections:
INDICATOR_EXE_Packed_Babel
SH256 hash:
b02361d21be9d1b11a8a35067686d38b919718052e89623815e0ebba699c9873
MD5 hash:
5c86a9d9a4b08e21a4f7470fb168141a
SHA1 hash:
6b1562d4a4c83499405559cb3105fe8fd85e3296
SH256 hash:
b4dda95a553a54212a8c3c98adf74628c8c4febc948b2ed267a0a225cb2e29fa
MD5 hash:
1efeb60e76dd54e9483fcf2902d634cf
SHA1 hash:
44600e64d7cbfd311686de6713c6cb1f8cba14d9
Detections:
Typical_Malware_String_Transforms
SH256 hash:
16646f36adf6060502fbc39d03fcae5ee314e4df3f4fce6fdd224595d182c173
MD5 hash:
5b0e485eda5b3b2a8e5c925eaeaaa902
SHA1 hash:
fae2731d6bb4ac3ae463926b3d64a982028bbd3e
SH256 hash:
f98cf9ee6e3f42fe35ec570b4728ecd65929ba24ba4c090c3b438c8de4677cc8
MD5 hash:
c0bd0765626bdb60acd2d0dbb25b8f2c
SHA1 hash:
9b0c4fb56039aec31aa12e8f7d6371ac6e8667ff
Detections:
INDICATOR_EXE_Packed_SmartAssembly
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Check_Debugger
Rule name:Check_VBox_Guest_Additions
Rule name:CMD_Shutdown
Author:adm1n_usa32
Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__RemoteAPI
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:INDICATOR_EXE_Packed_SmartAssembly
Author:ditekSHen
Description:Detects executables packed with SmartAssembly
Rule name:NET
Author:malware-lu
Rule name:pe_imphash
Rule name:SHA512_Constants
Author:phoul (@phoul)
Description:Look for SHA384/SHA512 constants
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

PureLogsStealer

Executable exe f98cf9ee6e3f42fe35ec570b4728ecd65929ba24ba4c090c3b438c8de4677cc8

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2024-01-07 23:14:20 UTC

url : hxxp://91.92.241.244/curl/ablast.exe