Analysis
-
max time kernel
51s -
max time network
52s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14-06-2024 03:26
Behavioral task
behavioral1
Sample
bd5eebdd00f4ddc22ddd82c3effb66a6f61b2e692bdbc344e023094ae5a93fde.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
bd5eebdd00f4ddc22ddd82c3effb66a6f61b2e692bdbc344e023094ae5a93fde.exe
Resource
win10v2004-20240508-en
General
-
Target
bd5eebdd00f4ddc22ddd82c3effb66a6f61b2e692bdbc344e023094ae5a93fde.exe
-
Size
1.5MB
-
MD5
6178c200fcca008bfe504e8710874a20
-
SHA1
7aaf71a30b6074e5faad8777bdcaab924b0a27e1
-
SHA256
bd5eebdd00f4ddc22ddd82c3effb66a6f61b2e692bdbc344e023094ae5a93fde
-
SHA512
fded4e490d4b58fa6c4415302c0e67228a721cf0532cb8d8a065161fbaf81dec6f0762d4e11b4a91c43524d37e579e246040a84b047aa1de2d65ec35d456ed7c
-
SSDEEP
24576:Jp0SaLchXh9m6TUPQOTj9XCy7G9v4J9s04oSRsDiRCjyAG8frlyHt:JpjXh06TUIOf7PTmoSRRRkyMAN
Malware Config
Signatures
-
PureLog Stealer
PureLog Stealer is an infostealer written in C#.
-
PureLog Stealer payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3468-1-0x000001F449290000-0x000001F449412000-memory.dmp family_purelog_stealer -
Detects executables packed with Babel 5 IoCs
Processes:
resource yara_rule behavioral2/memory/3468-1-0x000001F449290000-0x000001F449412000-memory.dmp INDICATOR_EXE_Packed_Babel behavioral2/memory/3468-3-0x000001F44B090000-0x000001F44B09E000-memory.dmp INDICATOR_EXE_Packed_Babel behavioral2/memory/3468-5-0x000001F44B0A0000-0x000001F44B0A8000-memory.dmp INDICATOR_EXE_Packed_Babel behavioral2/memory/3468-8-0x000001F44B1B0000-0x000001F44B1D4000-memory.dmp INDICATOR_EXE_Packed_Babel behavioral2/memory/3468-10-0x000001F44B1E0000-0x000001F44B1F6000-memory.dmp INDICATOR_EXE_Packed_Babel
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3468-0-0x00007FFEFB383000-0x00007FFEFB385000-memory.dmpFilesize
8KB
-
memory/3468-1-0x000001F449290000-0x000001F449412000-memory.dmpFilesize
1.5MB
-
memory/3468-3-0x000001F44B090000-0x000001F44B09E000-memory.dmpFilesize
56KB
-
memory/3468-5-0x000001F44B0A0000-0x000001F44B0A8000-memory.dmpFilesize
32KB
-
memory/3468-4-0x000001F44B150000-0x000001F44B16A000-memory.dmpFilesize
104KB
-
memory/3468-2-0x000001F463940000-0x000001F463A8C000-memory.dmpFilesize
1.3MB
-
memory/3468-6-0x00007FFEFB380000-0x00007FFEFBE41000-memory.dmpFilesize
10.8MB
-
memory/3468-7-0x000001F44B170000-0x000001F44B1A8000-memory.dmpFilesize
224KB
-
memory/3468-8-0x000001F44B1B0000-0x000001F44B1D4000-memory.dmpFilesize
144KB
-
memory/3468-9-0x000001F44B0B0000-0x000001F44B0BA000-memory.dmpFilesize
40KB
-
memory/3468-10-0x000001F44B1E0000-0x000001F44B1F6000-memory.dmpFilesize
88KB
-
memory/3468-11-0x000001F463CD0000-0x000001F463D62000-memory.dmpFilesize
584KB
-
memory/3468-13-0x00007FFEFB380000-0x00007FFEFBE41000-memory.dmpFilesize
10.8MB