MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 077225467638a420cf29fb9b3f0241416dcb9ed5d4ba32fdcf2bf28f095740bb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



PrivateLoader


Vendor detections: 9


Intelligence 9 IOCs YARA 1 File information Comments

SHA256 hash: 077225467638a420cf29fb9b3f0241416dcb9ed5d4ba32fdcf2bf28f095740bb
SHA3-384 hash: 6adff230acf8e2977b66dd42f33d7736f531cc5ca4b3a2212dcc82dc4c4e5f2ea65d01a7f8333bc1fcaef4588a9c2396
SHA1 hash: d231903de12e11e94f3b52c5b71fe8a6ecf30458
MD5 hash: 6415da5eeb7102dfb6147bcd3aa79eb3
humanhash: tennis-robin-four-eighteen
File name:077225467638a420cf29fb9b3f0241416dcb9ed5d4ba32fdcf2bf28f095740bb.exe
Download: download sample
Signature PrivateLoader
File size:1'805'824 bytes
First seen:2022-04-30 21:21:59 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash 9717f652c4ea111153dd1446d725de9f (2 x PrivateLoader)
ssdeep 49152:goeP5E4muoLBVwt/eGNdWCqzwp/NjM1n/D5X16z5Qiu6sTTBGRi:goeP5E4muaBVwdeGNdWCqzwpVjM1nr5z
TLSH T18C855A31A250F046FC67407ABD5622F75469253073D048FFEBC6A9B5A4A2BC6E338E17
TrID 40.3% (.EXE) Win64 Executable (generic) (10523/12/4)
19.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
17.2% (.EXE) Win32 Executable (generic) (4505/5/1)
7.7% (.EXE) OS/2 Executable (generic) (2029/13)
7.6% (.EXE) Generic Win/DOS Executable (2002/3)
File icon (PE):PE icon
dhash icon f0a8bab082828292 (8 x AgentTesla, 3 x RedLineStealer, 3 x PrivateLoader)
Reporter Anonymous
Tags:dll exe PrivateLoader

Intelligence


File Origin
# of uploads :
1
# of downloads :
396
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Reading critical registry keys
Sending a custom TCP request
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
control.exe fingerprint greyware
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
spyw
Score:
84 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Tries to harvest and steal browser information (history, passwords, etc)
Behaviour
Behavior Graph:
Threat name:
Win32.Downloader.PrivateLoader
Status:
Malicious
First seen:
2022-03-18 02:28:00 UTC
File Type:
PE (Dll)
Extracted files:
26
AV detection:
28 of 42 (66.67%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Checks computer location settings
Reads user/profile data of web browsers
Unpacked files
SH256 hash:
077225467638a420cf29fb9b3f0241416dcb9ed5d4ba32fdcf2bf28f095740bb
MD5 hash:
6415da5eeb7102dfb6147bcd3aa79eb3
SHA1 hash:
d231903de12e11e94f3b52c5b71fe8a6ecf30458
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MALWARE_Win_DLInjector06
Author:ditekSHen
Description:Detects downloader / injector

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments