MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7236d2230905b8b69837f4771afd6cfedf8f53fa370bc6e40adde9d29a0b7153. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



PrivateLoader


Vendor detections: 17


Intelligence 17 IOCs YARA 26 File information Comments

SHA256 hash: 7236d2230905b8b69837f4771afd6cfedf8f53fa370bc6e40adde9d29a0b7153
SHA3-384 hash: 9c782f0feb5838cd37a4932a92477ce7433366541283f057ced107f4cf40fbd8db81b4cc0e92e6754118b10b2f9b0eb8
SHA1 hash: 0f0c1146e4eefb79918df39d28ce6789859b3f2a
MD5 hash: 784170f3f56cb34bb67106f768d58c66
humanhash: quiet-happy-uniform-hotel
File name:HEUR-Trojan.Win32.Chapak.gen-7236d2230905b8b6.exe
Download: download sample
Signature PrivateLoader
File size:3'218'483 bytes
First seen:2023-01-17 01:55:08 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 101 x GuLoader, 64 x DiamondFox)
ssdeep 98304:J+ReiycbF+jfELmx+bxKH+fT5rtdckJjP:J+64msL4+fdrQkJr
TLSH T1D9E533256B69B927D631ADF2D3A63F9659E41632F05C8F1F03846874C7398E7022BD0E
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla)
Reporter abuse_ch
Tags:exe PrivateLoader


Avatar
abuse_ch
PrivateLoader C2:
http://62.204.41.27/9djZdj09/index.php

Intelligence


File Origin
# of uploads :
1
# of downloads :
273
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
60dc99_Outbyte-PC-Repa.zip
Verdict:
Malicious activity
Analysis date:
2021-06-30 19:16:52 UTC
Tags:
trojan evasion stealer vidar loader rat redline ficker phishing

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
Fabookie Infostealer
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %temp% directory
Сreating synchronization primitives
Creating a process from a recently created file
Creating a file
Moving a recently created file
Running batch commands
Sending a custom TCP request
DNS request
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Creating a process with a hidden window
Reading critical registry keys
Launching a process
Sending an HTTP GET request
Creating a window
Unauthorized injection to a recently created process
Blocking the Windows Defender launch
Query of malicious DNS domain
Unauthorized injection to a recently created process by context flags manipulation
Sending a TCP request to an infection source
Sending an HTTP GET request to an infection source
Unauthorized injection to a system process
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
No Threat
Threat level:
  10/10
Confidence:
80%
Tags:
overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
Amadey, PrivateLoader, Raccoon Stealer v
Detection:
malicious
Classification:
rans.troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large strings
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Detected VMProtect packer
Disable Windows Defender real time protection (registry)
DLL reload attack detected
Drops PE files to the document folder of the user
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
May check the online IP address of the machine
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Performs DNS queries to domains with low reputation
Query firmware table information (likely to detect VMs)
Renames NTDLL to bypass HIPS
Sets debug register (to hijack the execution of another thread)
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Writes a notice file (html or txt) to demand a ransom
Writes to foreign memory regions
Yara detected Amadey bot
Yara detected Amadeys stealer DLL
Yara detected Generic Downloader
Yara detected PrivateLoader
Yara detected Raccoon Stealer v2
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 785457 Sample: HEUR-Trojan.Win32.Chapak.ge... Startdate: 17/01/2023 Architecture: WINDOWS Score: 100 154 Snort IDS alert for network traffic 2->154 156 Multi AV Scanner detection for domain / URL 2->156 158 Malicious sample detected (through community Yara rule) 2->158 160 21 other signatures 2->160 12 HEUR-Trojan.Win32.Chapak.gen-7236d2230905b8b6.exe 10 2->12         started        process3 file4 102 C:\Users\user\AppData\...\setup_installer.exe, PE32 12->102 dropped 15 setup_installer.exe 15 12->15         started        process5 file6 104 C:\Users\user\AppData\...\setup_install.exe, PE32 15->104 dropped 106 C:\Users\user\AppData\...\libwinpthread-1.dll, PE32 15->106 dropped 108 C:\Users\user\AppData\...\libstdc++-6.dll, PE32 15->108 dropped 110 10 other files (9 malicious) 15->110 dropped 144 Multi AV Scanner detection for dropped file 15->144 146 Writes a notice file (html or txt) to demand a ransom 15->146 19 setup_install.exe 1 15->19         started        signatures7 process8 dnsIp9 134 motiwa.xyz 19->134 136 127.0.0.1 unknown unknown 19->136 94 C:\Users\user\...\arnatic_7.exe (copy), PE32 19->94 dropped 96 C:\Users\user\...\arnatic_6.exe (copy), PE32 19->96 dropped 98 C:\Users\user\...\arnatic_5.exe (copy), PE32 19->98 dropped 100 4 other malicious files 19->100 dropped 196 Multi AV Scanner detection for dropped file 19->196 198 Detected unpacking (changes PE section rights) 19->198 200 Performs DNS queries to domains with low reputation 19->200 24 cmd.exe 1 19->24         started        26 cmd.exe 1 19->26         started        28 cmd.exe 1 19->28         started        30 6 other processes 19->30 file10 signatures11 process12 dnsIp13 33 arnatic_6.exe 24->33         started        38 arnatic_2.exe 1 26->38         started        40 arnatic_3.exe 5 28->40         started        142 20.189.173.21 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 30->142 42 arnatic_4.exe 1 30->42         started        44 arnatic_1.exe 12 30->44         started        46 arnatic_7.exe 30->46         started        48 arnatic_5.exe 30->48         started        process14 dnsIp15 112 212.193.30.115 SPD-NETTR Russian Federation 33->112 114 136.144.41.133, 80 WORLDSTREAMNL Netherlands 33->114 122 16 other IPs or domains 33->122 78 C:\Users\...\yOPqygR9jMayea4l4Ns0SjEJ.exe, PE32 33->78 dropped 80 C:\Users\...\wsR2fBVoNEDbK6wgaKopGC27.exe, PE32+ 33->80 dropped 82 C:\Users\...\sZd61VCs24o6gurl8dFaxi5n.exe, PE32 33->82 dropped 90 16 other malicious files 33->90 dropped 162 Drops PE files to the document folder of the user 33->162 164 Creates HTML files with .exe extension (expired dropper behavior) 33->164 166 Disable Windows Defender real time protection (registry) 33->166 84 C:\Users\user\AppData\Local\Temp\CC4F.tmp, PE32 38->84 dropped 168 DLL reload attack detected 38->168 170 Detected unpacking (changes PE section rights) 38->170 172 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 38->172 180 4 other signatures 38->180 50 explorer.exe 38->50 injected 86 C:\Users\user\AppData\Local\Temp\axhub.dll, PE32 40->86 dropped 55 rundll32.exe 40->55         started        116 99.83.154.118 AMAZON-02US United States 42->116 124 3 other IPs or domains 42->124 88 C:\Users\user\AppData\...\jfiag3g_gg.exe, PE32 42->88 dropped 174 May check the online IP address of the machine 42->174 57 jfiag3g_gg.exe 42->57         started        59 jfiag3g_gg.exe 42->59         started        118 sergeevih43.tumblr.com 74.114.154.18, 443, 49704 AUTOMATTICUS Canada 44->118 176 Detected unpacking (overwrites its own PE header) 44->176 61 WerFault.exe 44->61         started        178 Injects a PE file into a foreign processes 46->178 63 arnatic_7.exe 46->63         started        120 148.251.234.83 HETZNER-ASDE Germany 48->120 file16 signatures17 process18 dnsIp19 126 204.11.56.48 CONFLUENCE-NETWORK-INCVG Virgin Islands (BRITISH) 50->126 128 206.119.99.162 COGENT-174US United States 50->128 130 45.200.38.91 Africa-on-Cloud-ASZA Seychelles 50->130 92 C:\Users\user\AppData\Roaming\wjtevia, PE32 50->92 dropped 182 System process connects to network (likely due to code injection or exploit) 50->182 184 Benign windows process drops PE files 50->184 186 Hides that the sample has been downloaded from the Internet (zone.identifier) 50->186 188 Writes to foreign memory regions 55->188 190 Allocates memory in foreign processes 55->190 192 Creates a thread in another existing process (thread injection) 55->192 65 svchost.exe 55->65 injected 68 svchost.exe 55->68 injected 70 svchost.exe 55->70 injected 72 8 other processes 55->72 194 Multi AV Scanner detection for dropped file 57->194 132 52.182.143.212 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 61->132 file20 signatures21 process22 signatures23 148 System process connects to network (likely due to code injection or exploit) 65->148 150 Sets debug register (to hijack the execution of another thread) 65->150 152 Modifies the context of a thread in another process (thread injection) 65->152 74 svchost.exe 65->74         started        process24 dnsIp25 138 email.yg9.me 35.241.7.66 GOOGLEUS United States 74->138 140 192.168.2.1 unknown unknown 74->140 202 Query firmware table information (likely to detect VMs) 74->202 signatures26
Threat name:
Win32.Ransomware.Cryptor
Status:
Malicious
First seen:
2021-07-01 07:02:06 UTC
File Type:
PE (Exe)
Extracted files:
192
AV detection:
29 of 39 (74.36%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
Score:
  10/10
Tags:
family:amadey family:fabookie family:gcleaner family:netsupport family:nullmixer family:privateloader family:raccoon family:redline family:smokeloader family:vidar botnet:64b445f2d85b7aeb3d5c7b23112d6ac3 botnet:706 botnet:@new@2023 botnet:andriii_ff botnet:domani2 botnet:logsdiller cloud (tg: @logsdillabot) botnet:medi2 aspackv2 backdoor discovery dropper evasion infostealer loader rat spyware stealer themida trojan upx
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Creates scheduled task(s)
Kills process with taskkill
Modifies data under HKEY_USERS
Modifies registry class
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks BIOS information in registry
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
Themida packer
Unexpected DNS network traffic destination
Uses the VBS compiler for execution
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
UPX packed file
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Nirsoft
Vidar Stealer
Amadey
Detect Fabookie payload
Detects Smokeloader packer
Fabookie
GCleaner
Modifies Windows Defender Real-time Protection settings
NetSupport
NullMixer
PrivateLoader
Raccoon
RedLine
RedLine payload
SmokeLoader
Suspicious use of NtCreateUserProcessOtherParentProcess
Vidar
Malware Config
C2 Extraction:
http://motiwa.xyz/
https://sergeevih43.tumblr.com/
flestriche.xyz:80
77.73.133.62:22344
45.12.253.56
45.12.253.72
45.12.253.98
45.12.253.75
62.204.41.27/9djZdj09/index.php
185.244.181.112:33056
http://45.15.156.209/
51.210.137.6:47909
167.235.156.206:6218
Unpacked files
SH256 hash:
0c2ade2993927f6de828e30c07156c19751b55650a05c965631ca0ea1c983498
MD5 hash:
cc0d6b6813f92dbf5be3ecacf44d662a
SHA1 hash:
b968c57a14ddada4128356f6e39fb66c6d864d3f
SH256 hash:
55361941ab12c7edd987c706d25423d868f756fab1028d99eeffacdabf3da4ca
MD5 hash:
4de4b7bc0a92902422c4204fcfa58150
SHA1 hash:
587e0299ea32cc836281998941daa60f471e3480
SH256 hash:
40ca14be87ccee1c66cce8ce07d7ed9b94a0f7b46d84f9147c4bbf6ddab75a67
MD5 hash:
7165e9d7456520d1f1644aa26da7c423
SHA1 hash:
177f9116229a021e24f80c4059999c4c52f9e830
SH256 hash:
88d629dddea8dfdd05fc95df6127ea1f4dba39aaebda4c92b54d26e0524c8d06
MD5 hash:
a4c3b30c70ed966388d45e81f007c7da
SHA1 hash:
d42151845d43b672909dc7a6cedf9839985ccf5f
SH256 hash:
664003cbe6a433ee57676929e973a5efe2644429ceeb348323ff70ed93e94d1e
MD5 hash:
890a74f18cc8b987518fe98e44c7b486
SHA1 hash:
af1381401d6ff9a3c7469ffad2fd5838890a4d95
Detections:
win_smokeloader_a2 SmokeLoaderStage2
SH256 hash:
ac8f84b82cde11ea518aa7334b3a3ef486b6c3a702ce82652de023b0060fa2e5
MD5 hash:
93478396f89d02930d44d9a797ba1800
SHA1 hash:
20ba0d4594ac9237cfd11ee057d7f995a624cb31
SH256 hash:
fa6ab58644eb7689792204abd965c96fb5da079eeb67eba1216bbc58393d82f0
MD5 hash:
8ae0ccb3e228fdf2c03e03280b09b207
SHA1 hash:
1438f72e0c0509e80f0658eb10edce47b0452ec1
SH256 hash:
d417bd4de6a5227f5ea5cff3567e74fe2b2a25c0a80123b7b37b27db89adc384
MD5 hash:
5668cb771643274ba2c375ec6403c266
SHA1 hash:
dd78b03428b99368906fe62fc46aaaf1db07a8b9
SH256 hash:
1829dc9d5bd2bbc85e384ad0bdfdc65ed0c9a6570a4afaafa028d16bfba38270
MD5 hash:
fd64a752f8c6b83453927ab06b5b14d6
SHA1 hash:
849a18ee63a31097cbd9c9cba74d5959a8ecb8e0
SH256 hash:
2b4a3c6d5d62270440c34e1ea75ba2878523eccc4ef85692c0e9497b6f1a8f43
MD5 hash:
5632c0cda7da1c5b57aeffeead5c40b7
SHA1 hash:
533805ba88fbd008457616ae2c3b585c952d3afe
SH256 hash:
d37e99805cee2a2a4d59542b88d1dfc23c7b166186666feef51f8751e940b174
MD5 hash:
7b61795697b50fb19d1f20bd8a234b67
SHA1 hash:
5134692d456da79579e9183c50db135485e95201
SH256 hash:
f4031df5e0df4785513fd9fc9843e0aba4623e61b58cd163354ea64f9133b388
MD5 hash:
bdd81266d64b5a226dd38e4decd8cc2c
SHA1 hash:
2395557e0d8fd9bcfe823391a9a7cfe78ee0551a
Detections:
PrivateLoader win_privateloader_w0 win_privateloader_auto win_privateloader_a0
SH256 hash:
e1cc6a9d780602fe6e789bf5c3a27e87e197a4e3bf7c8138ea2f9dfec70fb963
MD5 hash:
f707252b9c9579677fffb013e0cfc646
SHA1 hash:
8ab483023fa8773afb8c13464c39c5b8e687f126
SH256 hash:
58fa2dcad1001e5719e9f47ab4877f80058955d66a07616ef8c71ea7465f6747
MD5 hash:
bc5cea356fb87a2b85127140e5bbd054
SHA1 hash:
d5dd636362d5c1d7c0d9b02cf123a3d1be31584c
SH256 hash:
7236d2230905b8b69837f4771afd6cfedf8f53fa370bc6e40adde9d29a0b7153
MD5 hash:
784170f3f56cb34bb67106f768d58c66
SHA1 hash:
0f0c1146e4eefb79918df39d28ce6789859b3f2a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AsyncRat_Detection_Dec_2022
Author:Potatech
Description:AsyncRat
Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:command_and_control
Author:CD_R0M_
Description:This rule searches for common strings found by malware using C2. Based on a sample used by a Ransomware group
Rule name:INDICATOR_EXE_Packed_ASPack
Author:ditekSHen
Description:Detects executables packed with ASPack
Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation
Author:ditekSHen
Description:Detects executables containing potential Windows Defender anti-emulation checks
Rule name:MALWARE_Win_Chebka
Author:ditekSHen
Description:Detects Chebka
Rule name:MALWARE_Win_DLInjector03
Author:ditekSHen
Description:Detects unknown loader / injector
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:MALWARE_Win_Vidar
Author:ditekSHen
Description:Detects Vidar / ArkeiStealer
Rule name:Mal_InfoStealer_Win32_RedLine_Unobfuscated_2021
Author:BlackBerry Threat Research Team
Description:Detects Unobfuscated RedLine Infostealer Executables (.NET)
Rule name:meth_stackstrings
Author:Willi Ballenthin
Rule name:pe_imphash
Rule name:Redline32
Author:Muffin
Description:This rule detects Redline Stealer
Rule name:RedLine_a
Author:@bartblaze
Description:Identifies RedLine stealer.
Rule name:redline_new_bin
Author:James_inthe_box
Description:Redline stealer
Reference:https://app.any.run/tasks/4921d1fe-1a14-4bf2-9d27-c443353362a8
Rule name:redline_stealer
Author:jeFF0Falltrades
Description:This rule matches unpacked RedLine Stealer samples and derivatives (as of APR2021)
Rule name:RedOctoberPluginCollectInfo
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:SUSP_XORed_MSDOS_Stub_Message
Author:Florian Roth
Description:Detects suspicious XORed MSDOS stub message
Reference:https://yara.readthedocs.io/en/latest/writingrules.html#xor-strings
Rule name:Windows_Trojan_Generic_a681f24a
Author:Elastic Security
Rule name:Windows_Trojan_RedLineStealer_f54632eb
Author:Elastic Security
Rule name:Windows_Trojan_Smokeloader_3687686f
Author:Elastic Security
Rule name:Windows_Trojan_Vidar_114258d5
Author:Elastic Security
Rule name:Windows_Trojan_Vidar_9007feb2
Author:Elastic Security
Rule name:win_vidar_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.vidar.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments