MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 44ee2445a8afa4123bd2edb2bcbe258f8c344f73fda88d03097e22a7928d313d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



PrivateLoader


Vendor detections: 12


Intelligence 12 IOCs YARA 10 File information Comments

SHA256 hash: 44ee2445a8afa4123bd2edb2bcbe258f8c344f73fda88d03097e22a7928d313d
SHA3-384 hash: a655560805ecbfa540701af6f6b319972f02fa120483c59733f7a8853477be3564f735d9f736a6f91c1ba7f52eda790d
SHA1 hash: 73fcc337713a4cc0e7f9c32b6f7d282b827f16ef
MD5 hash: 3ae876e56ca9a650b3a9a3f3f66748e2
humanhash: lion-california-hotel-triple
File name:3ae876e56ca9a650b3a9a3f3f66748e2.exe
Download: download sample
Signature PrivateLoader
File size:5'862'400 bytes
First seen:2023-03-12 19:22:43 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 31a14226d3e64a75d1fc504da54b963c (1 x RedLineStealer, 1 x Amadey, 1 x PrivateLoader)
ssdeep 98304:P1h3ucOg+2rajZV1rrcl8SgvUImkTtR+To4eboVEdZlgCyPBJeWLZktIDyWM+hdl:NEc9vraVRc8sU/+E4r+dcC+BQW1kqDyS
Threatray 225 similar samples on MalwareBazaar
TLSH T10246334D193F42D9DB68497E002465F0EA22FD9EFC81AD2D76D8233B92331D38B56627
TrID 52.9% (.EXE) Win32 Executable (generic) (4505/5/1)
23.5% (.EXE) Generic Win/DOS Executable (2002/3)
23.5% (.EXE) DOS Executable Generic (2000/1)
File icon (PE):PE icon
dhash icon 7cfcdcd8d4f4f4f4 (1 x PrivateLoader, 1 x DCRat, 1 x CoinMiner)
Reporter abuse_ch
Tags:exe PrivateLoader

Intelligence


File Origin
# of uploads :
1
# of downloads :
251
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
7fe97c1ef6fbf00093805ec6bcbd2676.exe
Verdict:
Malicious activity
Analysis date:
2023-03-12 19:26:38 UTC
Tags:
evasion opendir loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for analyzing tools
Searching for the window
Creating a file in the Windows subdirectories
Сreating synchronization primitives
Modifying a system file
Sending an HTTP GET request
Replacing files
DNS request
Sending a custom TCP request
Launching a service
Launching a process
Reading critical registry keys
Sending a UDP request
Creating a file
Forced system process termination
Creating a process from a recently created file
Creating a process with a hidden window
Creating a window
Creating a file in the %temp% subdirectories
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Blocking the Windows Defender launch
Unauthorized injection to a recently created process
Adding exclusions to Windows Defender
Sending an HTTP GET request to an infection source
Unauthorized injection to a system process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
packed shell32.dll
Result
Threat name:
Nymaim, PrivateLoader, RHADAMANTHYS, Red
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Checks if the current machine is a virtual machine (disk enumeration)
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (changes PE section rights)
Detected unpacking (creates a PE file in dynamic memory)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender real time protection (registry)
Disables Windows Defender (deletes autostart)
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Modifies Group Policy settings
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sets debug register (to hijack the execution of another thread)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Uses cmd line tools excessively to alter registry or file data
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected lgoogLoader
Yara detected Nymaim
Yara detected PrivateLoader
Yara detected RedLine Stealer
Yara detected RHADAMANTHYS Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 824978 Sample: zAtOGFlwK5.exe Startdate: 12/03/2023 Architecture: WINDOWS Score: 100 122 45.12.253.98 CMCSUS Germany 2->122 156 Multi AV Scanner detection for domain / URL 2->156 158 Malicious sample detected (through community Yara rule) 2->158 160 Antivirus detection for URL or domain 2->160 162 16 other signatures 2->162 12 zAtOGFlwK5.exe 11 45 2->12         started        signatures3 process4 dnsIp5 136 87.240.137.164 VKONTAKTE-SPB-AShttpvkcomRU Russian Federation 12->136 138 95.142.206.1 VKONTAKTE-SPB-AShttpvkcomRU Russian Federation 12->138 140 12 other IPs or domains 12->140 108 C:\Users\...\rIogTMqE2UcgKSZNe0ww7__H.exe, PE32 12->108 dropped 110 C:\Users\...\iJALls6GnDDOONk0eU6nSIyW.exe, PE32 12->110 dropped 112 C:\Users\...\fry5qhUqveBJDZELQoaoSIDZ.exe, PE32 12->112 dropped 114 14 other malicious files 12->114 dropped 174 Detected unpacking (changes PE section rights) 12->174 176 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 12->176 178 Query firmware table information (likely to detect VMs) 12->178 180 10 other signatures 12->180 17 HolzIcCGa9kWZQbYALtHUpPd.exe 7 12->17         started        21 fry5qhUqveBJDZELQoaoSIDZ.exe 2 12->21         started        23 IZbU8xUmYIfLAsYSMV4NULgb.exe 32 12->23         started        26 7 other processes 12->26 file6 signatures7 process8 dnsIp9 74 C:\Users\user\AppData\Local\...\7360859.dll, PE32 17->74 dropped 146 Writes to foreign memory regions 17->146 148 Allocates memory in foreign processes 17->148 150 Injects a PE file into a foreign processes 17->150 28 fontview.exe 17->28         started        32 ngentask.exe 17->32         started        76 C:\Users\user\AppData\Local\...\is-F6M5B.tmp, PE32 21->76 dropped 34 is-F6M5B.tmp 21->34         started        124 185.26.182.94 NO-OPERANO Norway 23->124 126 82.145.216.20 NO-OPERANO United Kingdom 23->126 132 3 other IPs or domains 23->132 78 Opera_installer_2303130335454935796.dll, PE32 23->78 dropped 80 C:\Users\user\AppData\Local\...\opera_package, PE32 23->80 dropped 82 C:\Users\...\IZbU8xUmYIfLAsYSMV4NULgb.exe, PE32 23->82 dropped 84 Opera_96.0.4693.50_Autoupdate_x64[1].exe, PE32 23->84 dropped 37 IZbU8xUmYIfLAsYSMV4NULgb.exe 23->37         started        39 IZbU8xUmYIfLAsYSMV4NULgb.exe 23->39         started        128 157.240.20.35 FACEBOOKUS United States 26->128 130 157.240.252.35 FACEBOOKUS United States 26->130 134 3 other IPs or domains 26->134 86 C:\Users\user\AppData\Local\...\Install.exe, PE32 26->86 dropped 88 C:\ProgramData\Package\CARWD.exe, PE32+ 26->88 dropped 152 Tries to harvest and steal browser information (history, passwords, etc) 26->152 154 Sets debug register (to hijack the execution of another thread) 26->154 41 Install.exe 26->41         started        43 WerFault.exe 26->43         started        45 conhost.exe 26->45         started        47 2 other processes 26->47 file10 signatures11 process12 dnsIp13 142 179.43.142.248 PLI-ASCH Panama 28->142 164 Query firmware table information (likely to detect VMs) 28->164 166 Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines) 28->166 168 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 28->168 170 6 other signatures 28->170 90 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 34->90 dropped 92 C:\Users\user\AppData\Local\...\_isdecmp.dll, PE32 34->92 dropped 94 C:\Users\user\AppData\Local\...\_iscrypt.dll, PE32 34->94 dropped 102 7 other files (5 malicious) 34->102 dropped 49 FRec312.exe 34->49         started        96 Opera_installer_2303130336047431552.dll, PE32 37->96 dropped 98 Opera_installer_2303130336131885344.dll, PE32 39->98 dropped 100 C:\Users\user\AppData\Local\...\Install.exe, PE32 41->100 dropped 53 Install.exe 41->53         started        144 20.189.173.20 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 43->144 file14 signatures15 process16 dnsIp17 116 45.12.253.56 CMCSUS Germany 49->116 118 45.12.253.72 CMCSUS Germany 49->118 120 45.12.253.75 CMCSUS Germany 49->120 104 C:\Users\user\AppData\Roaming\...\iaERq.exe, PE32 49->104 dropped 55 iaERq.exe 49->55         started        106 C:\Users\user\AppData\Local\...\nzEHKUL.exe, PE32 53->106 dropped 57 forfiles.exe 53->57         started        59 forfiles.exe 53->59         started        file18 process19 process20 61 cmd.exe 57->61         started        64 conhost.exe 57->64         started        66 conhost.exe 59->66         started        68 cmd.exe 59->68         started        signatures21 172 Uses cmd line tools excessively to alter registry or file data 61->172 70 reg.exe 61->70         started        72 reg.exe 61->72         started        process22
Threat name:
Win32.Trojan.Privateloader
Status:
Malicious
First seen:
2023-03-11 21:27:15 UTC
File Type:
PE (Exe)
Extracted files:
33
AV detection:
22 of 39 (56.41%)
Threat level:
  5/5
Result
Malware family:
privateloader
Score:
  10/10
Tags:
family:privateloader evasion loader main spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Program crash
Drops file in System32 directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Checks whether UAC is enabled
Looks up external IP address via web service
Checks BIOS information in registry
Checks computer location settings
Reads user/profile data of web browsers
Identifies VirtualBox via ACPI registry values (likely anti-VM)
PrivateLoader
Malware Config
C2 Extraction:
http://91.241.19.125/pub.php?pub=one
http://sarfoods.com/index.php
149.154.158.34
94.142.138.113
94.142.138.131
208.67.104.60
Unpacked files
SH256 hash:
69575fbffe2adc9b3795e1027efb9c2e4b31763e2d76ac524805ace52ebb8dd9
MD5 hash:
db7fde73ca5e08418e074cb9fdb2b59b
SHA1 hash:
08030ce93c11ebc40f44c8ece64cfb244f3e6cb0
Detections:
PrivateLoader win_privateloader_w0 win_privateloader_a0
SH256 hash:
44ee2445a8afa4123bd2edb2bcbe258f8c344f73fda88d03097e22a7928d313d
MD5 hash:
3ae876e56ca9a650b3a9a3f3f66748e2
SHA1 hash:
73fcc337713a4cc0e7f9c32b6f7d282b827f16ef
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:HeavensGate
Author:kevoreilly
Description:Heaven's Gate: Switch from 32-bit to 64-mode
Rule name:INDICATOR_EXE_Packed_MPress
Author:ditekSHen
Description:Detects executables built or packed with MPress PE compressor
Rule name:MALWARE_Win_DLInjector06
Author:ditekSHen
Description:Detects downloader / injector
Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:privateloader
Author:andretavare5
Description:PrivateLoader pay-per-install malware
Rule name:Privateloader_Main_Component
Description:Detects PrivateLoader Main Component
Rule name:TeslaCryptPackedMalware
Rule name:Windows_Trojan_PrivateLoader_96ac2734
Author:Elastic Security
Rule name:win_privateloader
Rule name:win_privateloader_w0
Author:andretavare5
Reference:https://tavares.re/blog/2022/06/06/hunting-privateloader-pay-per-install-service

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

PrivateLoader

Executable exe 44ee2445a8afa4123bd2edb2bcbe258f8c344f73fda88d03097e22a7928d313d

(this sample)

  
Delivery method
Distributed via web download

Comments