Concrete signature match: Trojan - Appears legitimate but performs malicious actions for .NET (Microsoft Intermediate Language) platform, family PureLogStealer
This is a Trojan stealer from the PureLogStealer family, specifically designed to collect and exfiltrate sensitive user credentials and other personal information from the compromised system. Its detection is concrete and confirmed by machine learning behavioral analysis.
No detailed analysis available from definition files.
b5f172450ea32e87be50bbb17b7a473f6bbc94937c200c8653f9c2c8f500767fc90957ae325f7ecd6d23004503133a029fe0691e0542afb2a2b335c4841622ac9e622b7fc3477a07d1e0d95b14d1ee6e5fb71bdb475a6477c87ab913a5be877d423784e2d4833708ba835e34908d46369df1cfd54b82d038c0b052f2efd87c18c7aca60ac92e29449403fe9b85b5268eaf584fb582a53c1c743881abeac3218eEnsure Windows Defender has successfully quarantined or removed the threat. Perform a full system scan and immediately change all sensitive passwords (e.g., banking, email, social media) that were accessed from the affected device, as this is a stealer. Monitor network activity for any signs of continued data exfiltration.