Unpacking and Analyzing Purelog Stealer (ft. a quick trick using Powershell)
Introduction In this blog post, I'll be showcasing via example a useful trick to invoke .NET methods from Powershell and skipping all the anti-analysis routines. The same technique could be used for string decryption and other things. We'll be unpacking a sample which I suspect, based on the loading steps, to be Purelog Stealer (This is an advanced stage. I won't bother you with how I got to this stage tldr; boring stuff, AutoIt.) using Powershell and then presenting an analysis of how the sample works and what I think it does. Hash of this stage sha256: 46ddbdbe28dbdfb95cefa95b3597b989a50cd415fb978fe7fb14d2b8e3b5dee8 How is the payload stored? Skimming through the method, we find this memory stream Usually, something like this is very interesting and worth exploring. Tracing this method. We find the decrypted stream used in this method. Something is loaded, so that's a giveaway that we're dealing with an unpacking routine. Another method is called before the loadi...