General

  • Target

    Jkxkt.exe

  • Size

    50KB

  • MD5

    0f271d188d1e3c4fdbf194aa075b08d4

  • SHA1

    3b2ac45083f47c1f85ffa1465fd7ad4fd83b661c

  • SHA256

    888027b5448274a11bd0e967005ad0100aa1c137776c292d52fff8a3a713c2ec

  • SHA512

    fd781dd49eedfa71f4f656b8da183e9c2a54752247a052408d0c79012eb8a6a9e13c58eec39b856637b7ee5c1f3a38036cfe9b848c40bfccf3df412f464c76cb

  • SSDEEP

    1536:4bbKjYiHtMYiGfcYmI4xb7GEepmAoAPx:9EiNWGfBst7cmRq

Score
10/10

Malware Config

Signatures

  • PureLog Stealer payload 1 IoCs
  • Purelogstealer family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Jkxkt.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections