MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 803af90de603592cfdca6c9b6a8ffc39130a54dee552f0758f7ebf07ab327fc5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



PrivateLoader


Vendor detections: 15


Intelligence 15 IOCs YARA 14 File information Comments

SHA256 hash: 803af90de603592cfdca6c9b6a8ffc39130a54dee552f0758f7ebf07ab327fc5
SHA3-384 hash: 6ce4b578d6a2a2afe2a1a24c85a6ac54c190015255e5b13fda9ee918883beca0d85b8f0f982937914a3bf02bed582ba5
SHA1 hash: 85da5dabe5797323057aca3d1a2bb66a4d75ee81
MD5 hash: ce3ad5b4ca386cfb4b47daf322441283
humanhash: thirteen-timing-october-jig
File name:SecuriteInfo.com.Win64.PWSX-gen.29347.28297
Download: download sample
Signature PrivateLoader
File size:1'843'424 bytes
First seen:2024-05-23 20:24:40 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 79856d4b034c49dc3dd3e403b25b6bbf (3 x AgentTesla, 2 x PrivateLoader)
ssdeep 24576:HynjN3fi9dEoZR814OEQjls30eTFxmT4i8eMOq52FOXuq01dKqOFUC:SjN3CdJ81nEQhs30evuqsrOFUC
Threatray 37 similar samples on MalwareBazaar
TLSH T1A285BF05A3F801E4E46BC634CA599733D2B1B44A1730E5CB0A5AD7922F73EE15BBF612
TrID 72.7% (.CPL) Windows Control Panel Item (generic) (57583/11/19)
13.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
2.5% (.EXE) OS/2 Executable (generic) (2029/13)
2.5% (.EXE) Generic Win/DOS Executable (2002/3)
Reporter SecuriteInfoCom
Tags:exe PrivateLoader signed

Code Signing Certificate

Organisation:Microsoft Code Signing PCA 2011
Issuer:Microsoft Code Signing PCA 2011
Algorithm:sha256WithRSAEncryption
Valid from:2024-05-23T16:47:46Z
Valid to:2025-05-23T16:47:46Z
Serial number: b3631bd8543455a0d8966665d703a03a
Thumbprint Algorithm:SHA256
Thumbprint: b2855f29c1e83ac7a7898a740246c0cddbf50f4904c1ad6ad4f1ef2f9fe8beb1
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
374
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
803af90de603592cfdca6c9b6a8ffc39130a54dee552f0758f7ebf07ab327fc5.exe
Verdict:
Malicious activity
Analysis date:
2024-05-23 20:26:22 UTC
Tags:
opendir evasion berbew adware neoreklami privateloader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.1%
Tags:
Encryption Execution Network Static
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a process with a hidden window
Creating a file
Launching a process
Сreating synchronization primitives
DNS request
Connection attempt
Sending a custom TCP request
Creating a process from a recently created file
Searching for synchronization primitives
Creating a window
Creating a file in the %temp% directory
Sending a UDP request
Sending an HTTP GET request
Moving a file to the %temp% directory
Searching for analyzing tools
Modifying a system file
Using the Windows Management Instrumentation requests
Replacing files
Launching a service
Running batch commands
Reading critical registry keys
Launching cmd.exe command interpreter
Connection attempt to an infection source
Blocking the Windows Defender launch
Adding an exclusion to Microsoft Defender
Unauthorized injection to a system process
Enabling autorun by creating a file
Sending an HTTP GET request to an infection source
Adding exclusions to Windows Defender
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
evasive fingerprint hacktool lolbin overlay packed regedit shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Neoreklami, PureLog Stealer
Detection:
malicious
Classification:
rans.troj.adwa.spyw.expl.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Adds extensions / path to Windows Defender exclusion list (Registry)
AI detected suspicious sample
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (changes PE section rights)
Disable Windows Defender real time protection (registry)
Disables Windows Defender (deletes autostart)
Drops PE files to the document folder of the user
Drops PE files to the user root directory
Drops script or batch files to the startup folder
Exclude list of file types from scheduled, custom, and real-time scanning
Found direct / indirect Syscall (likely to bypass EDR)
Hides threads from debuggers
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Modifies Group Policy settings
Modifies Windows Defender protection settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Sample uses process hollowing technique
Sigma detected: Drops script at startup location
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Suspicious powershell command line found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Uses cmd line tools excessively to alter registry or file data
Writes many files with high entropy
Writes to foreign memory regions
Yara detected Generic Downloader
Yara detected Neoreklami
Yara detected PureLog Stealer
Yara detected UAC Bypass using CMSTP
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1446817 Sample: SecuriteInfo.com.Win64.PWSX... Startdate: 23/05/2024 Architecture: WINDOWS Score: 100 174 Malicious sample detected (through community Yara rule) 2->174 176 Antivirus detection for URL or domain 2->176 178 Antivirus detection for dropped file 2->178 180 11 other signatures 2->180 14 SecuriteInfo.com.Win64.PWSX-gen.29347.28297.exe 3 2->14         started        18 cmd.exe 2->18         started        20 svchost.exe 2->20         started        22 2 other processes 2->22 process3 file4 152 SecuriteInfo.com.W...gen.29347.28297.exe, PE32+ 14->152 dropped 218 Drops PE files to the user root directory 14->218 220 Writes to foreign memory regions 14->220 222 Allocates memory in foreign processes 14->222 224 3 other signatures 14->224 24 InstallUtil.exe 15 255 14->24         started        29 powershell.exe 23 14->29         started        31 conhost.exe 14->31         started        33 conhost.exe 18->33         started        signatures5 process6 dnsIp7 160 5.42.66.47 RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU Russian Federation 24->160 162 104.192.108.17 QIHOOBeijingQihuTechnologyCompanyLimitedCN United States 24->162 164 9 other IPs or domains 24->164 144 C:\Users\...\z31AXtpc6a4pNKLIOPkJxhtJ.exe, MS-DOS 24->144 dropped 146 C:\Users\...\yptzuTYQMt5f1gpMjGpbgTzN.exe, PE32 24->146 dropped 148 C:\Users\...\xQltwoqHZIiEciMGzLMpKZj2.exe, PE32 24->148 dropped 150 150 other malicious files 24->150 dropped 208 Drops script or batch files to the startup folder 24->208 210 Creates HTML files with .exe extension (expired dropper behavior) 24->210 212 Uses cmd line tools excessively to alter registry or file data 24->212 216 2 other signatures 24->216 35 i9uRYWhrQyGYCPpa7glCYsFK.exe 24->35         started        40 6yR20eQ04ke07dkYoH8C7DRE.exe 24->40         started        42 p61bxfYEUuPllBgLguDXFc53.exe 24->42         started        46 4 other processes 24->46 214 Loading BitLocker PowerShell Module 29->214 44 conhost.exe 29->44         started        file8 signatures9 process10 dnsIp11 154 176.111.174.109 WILWAWPL Russian Federation 35->154 156 87.240.132.72 VKONTAKTE-SPB-AShttpvkcomRU Russian Federation 35->156 158 18 other IPs or domains 35->158 126 C:\Users\...\vO4_UEFLfGX_bXc9WLglyhqL.exe, PE32+ 35->126 dropped 128 C:\Users\...\sQwtsCwKLAl9opVirAWhOFCM.exe, PE32 35->128 dropped 130 C:\Users\...\mOccBhHDU9kklZ09k0mCw7Yr.exe, PE32+ 35->130 dropped 136 26 other malicious files 35->136 dropped 186 Query firmware table information (likely to detect VMs) 35->186 188 Drops PE files to the document folder of the user 35->188 190 Creates HTML files with .exe extension (expired dropper behavior) 35->190 200 10 other signatures 35->200 138 5 other malicious files 40->138 dropped 48 Install.exe 40->48         started        132 C:\Users\user\AppData\Local\...\notepad.exe, PE32+ 42->132 dropped 134 C:\Users\user\AppData\Local\Temp\...\bash.exe, PE32+ 42->134 dropped 140 3 other malicious files 42->140 dropped 51 Install.exe 42->51         started        142 10 other malicious files 46->142 dropped 192 Detected unpacking (changes PE section rights) 46->192 194 Tries to detect sandboxes and other dynamic analysis tools (window names) 46->194 196 Tries to evade debugger and weak emulator (self modifying code) 46->196 198 Found direct / indirect Syscall (likely to bypass EDR) 46->198 53 Install.exe 46->53         started        file12 signatures13 process14 signatures15 166 Multi AV Scanner detection for dropped file 48->166 168 Modifies Windows Defender protection settings 48->168 55 cmd.exe 48->55         started        58 forfiles.exe 48->58         started        60 cmd.exe 51->60         started        62 forfiles.exe 51->62         started        process16 signatures17 202 Suspicious powershell command line found 55->202 204 Uses cmd line tools excessively to alter registry or file data 55->204 206 Modifies Windows Defender protection settings 55->206 64 forfiles.exe 55->64         started        67 forfiles.exe 55->67         started        69 forfiles.exe 55->69         started        75 3 other processes 55->75 77 2 other processes 58->77 71 forfiles.exe 60->71         started        73 forfiles.exe 60->73         started        79 4 other processes 60->79 81 2 other processes 62->81 process18 signatures19 83 cmd.exe 64->83         started        86 cmd.exe 67->86         started        88 cmd.exe 69->88         started        170 Modifies Windows Defender protection settings 71->170 96 2 other processes 71->96 90 cmd.exe 73->90         started        98 2 other processes 75->98 92 powershell.exe 77->92         started        100 3 other processes 79->100 172 Suspicious powershell command line found 81->172 94 powershell.exe 81->94         started        process20 signatures21 182 Uses cmd line tools excessively to alter registry or file data 83->182 102 reg.exe 83->102         started        104 reg.exe 86->104         started        106 reg.exe 88->106         started        108 reg.exe 90->108         started        110 reg.exe 96->110         started        112 powershell.exe 98->112         started        114 reg.exe 98->114         started        184 Suspicious powershell command line found 100->184 116 powershell.exe 100->116         started        118 2 other processes 100->118 process22 process23 120 gpupdate.exe 112->120         started        122 gpupdate.exe 116->122         started        process24 124 conhost.exe 120->124         started       
Threat name:
Win64.Trojan.Amadey
Status:
Malicious
First seen:
2024-05-23 19:45:21 UTC
File Type:
PE+ (Exe)
Extracted files:
1
AV detection:
16 of 24 (66.67%)
Threat level:
  5/5
Result
Malware family:
privateloader
Score:
  10/10
Tags:
family:privateloader adware bootkit discovery evasion execution loader persistence ransomware spyware stealer themida trojan
Behaviour
Modifies registry class
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Checks SCSI registry key(s)
Checks processor information in registry
Creates scheduled task(s)
Enumerates system info in registry
Modifies data under HKEY_USERS
NSIS installer
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Drops file in Windows directory
Drops file in System32 directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Adds Run key to start application
Checks for any installed AV software in registry
Checks installed software on the system
Checks whether UAC is enabled
Drops Chrome extension
Drops desktop.ini file(s)
Enumerates connected drives
Installs/modifies Browser Helper Object
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Maps connected drives based on registry
Writes to the Master Boot Record (MBR)
Checks BIOS information in registry
Checks computer location settings
Drops startup file
Executes dropped EXE
Loads dropped DLL
Modifies system executable filetype association
Reads user/profile data of web browsers
Registers COM server for autorun
Themida packer
Unexpected DNS network traffic destination
Blocklisted process makes network request
Command and Scripting Interpreter: PowerShell
Downloads MZ/PE file
Drops file in Drivers directory
Modifies Installed Components in the registry
Sets service image path in registry
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Modifies boot configuration data using bcdedit
Modifies firewall policy service
PrivateLoader
Windows security bypass
Unpacked files
SH256 hash:
803af90de603592cfdca6c9b6a8ffc39130a54dee552f0758f7ebf07ab327fc5
MD5 hash:
ce3ad5b4ca386cfb4b47daf322441283
SHA1 hash:
85da5dabe5797323057aca3d1a2bb66a4d75ee81
Detections:
INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCMD
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__MemoryWorkingSet
Author:Fernando Mercês
Description:Anti-debug process memory working set size check
Reference:http://www.gironsec.com/blog/2015/06/anti-debugger-trick-quicky/
Rule name:Disable_Defender
Author:iam-py-test
Description:Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
Rule name:INDICATOR_SUSPICIOUS_EXE_RawPaste_URL
Author:ditekSHen
Description:Detects executables (downlaoders) containing URLs to raw contents of a paste
Rule name:INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCMD
Author:ditekSHen
Description:Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF
Rule name:MSIL_TinyDownloader_Generic
Author:albertzsigovits
Description:Detects small-sized dotNET downloaders
Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:pe_imphash
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

PrivateLoader

Executable exe 803af90de603592cfdca6c9b6a8ffc39130a54dee552f0758f7ebf07ab327fc5

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (GUARD_CF)high
Reviews
IDCapabilitiesEvidence
AUTH_APIManipulates User AuthorizationADVAPI32.dll::RevertToSelf
SECURITY_BASE_APIUses Security Base APIADVAPI32.dll::AdjustTokenPrivileges
ADVAPI32.dll::CheckTokenMembership
ADVAPI32.dll::DuplicateTokenEx
ADVAPI32.dll::GetTokenInformation
ADVAPI32.dll::ImpersonateLoggedOnUser
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CreateProcessA
KERNEL32.dll::CreateProcessW
ADVAPI32.dll::OpenProcessToken
KERNEL32.dll::OpenProcess
ADVAPI32.dll::OpenThreadToken
KERNEL32.dll::VirtualAllocEx
KERNEL32.dll::VirtualAllocExNuma
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryExW
KERNEL32.dll::GetSystemInfo
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::AllocConsole
KERNEL32.dll::WriteConsoleW
KERNEL32.dll::FreeConsole
KERNEL32.dll::GetConsoleOutputCP
KERNEL32.dll::GetConsoleMode
KERNEL32.dll::GetConsoleWindow
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CopyFileExW
KERNEL32.dll::CreateFileW
KERNEL32.dll::DeleteFileW
KERNEL32.dll::GetSystemDirectoryW
WIN_BASE_USER_APIRetrieves Account InformationADVAPI32.dll::LookupPrivilegeValueW
WIN_BCRYPT_APICan Encrypt Filesbcrypt.dll::BCryptDecrypt
bcrypt.dll::BCryptDestroyKey
bcrypt.dll::BCryptEncrypt
bcrypt.dll::BCryptGenRandom
bcrypt.dll::BCryptImportKey
bcrypt.dll::BCryptOpenAlgorithmProvider
WIN_REG_APICan Manipulate Windows RegistryADVAPI32.dll::RegOpenKeyExW
ADVAPI32.dll::RegQueryValueExW
ADVAPI32.dll::RegSetValueExW
ADVAPI32.dll::RegSetValueExA

Comments