MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 93ac84d519edb6350cf53736449330985fe1cb52eff043857daf6cca916d6fa3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



PrivateLoader


Vendor detections: 15


Intelligence 15 IOCs 1 YARA 18 File information Comments

SHA256 hash: 93ac84d519edb6350cf53736449330985fe1cb52eff043857daf6cca916d6fa3
SHA3-384 hash: d670e51f86f2605716deaddf9fe59fb0bdfbd7ddeb5ad52b1af87361dbb3dcf1ea53f9dcbc1fe4e8cb01c58d361935b5
SHA1 hash: 8264a0c923f846422be4fb6d29991b091c034362
MD5 hash: bebfa25ff4e87540fd63b3c49cde912d
humanhash: bluebird-may-zebra-fillet
File name:93AC84D519EDB6350CF53736449330985FE1CB52EFF04.exe
Download: download sample
Signature PrivateLoader
File size:4'772'562 bytes
First seen:2022-10-25 17:45:34 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 32569d67dc210c5cb9a759b08da2bdb3 (122 x RedLineStealer, 42 x DiamondFox, 37 x RaccoonStealer)
ssdeep 98304:xCCvLUBsg3O305JTOzlgZasmlIfZnPO9N8r6YPXZP0ZPyUZwXXwSkYW:xzLUCg314lpl8OYPXZIqJwh
TLSH T1E626331073C1D2FAD8A34133BC54D7BAE674D75A0EA298FB3B5C97131B388D4E60A859
TrID 33.5% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
21.3% (.EXE) Win64 Executable (generic) (10523/12/4)
13.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
10.2% (.EXE) Win16 NE executable (generic) (5038/12/1)
9.1% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 848c5454baf47474 (2'088 x Adware.Neoreklami, 101 x RedLineStealer, 33 x DiamondFox)
Reporter abuse_ch
Tags:exe PrivateLoader


Avatar
abuse_ch
PrivateLoader C2:
79.137.199.60:4691

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
79.137.199.60:4691 https://threatfox.abuse.ch/ioc/926486/

Intelligence


File Origin
# of uploads :
1
# of downloads :
279
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
socelars
ID:
1
File name:
93AC84D519EDB6350CF53736449330985FE1CB52EFF04.exe
Verdict:
Malicious activity
Analysis date:
2022-10-25 17:48:00 UTC
Tags:
evasion opendir trojan socelars stealer loader redline rat

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %temp% subdirectories
Сreating synchronization primitives
Creating a process from a recently created file
Running batch commands
Sending a custom TCP request
Searching for synchronization primitives
Launching a process
Launching the default Windows debugger (dwwin.exe)
Creating a process with a hidden window
Creating a window
Sending an HTTP GET request
DNS request
Reading critical registry keys
Creating a file
Launching cmd.exe command interpreter
Query of malicious DNS domain
Unauthorized injection to a recently created process
Blocking the Windows Defender launch
Sending an HTTP GET request to an infection source
Unauthorized injection to a system process
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckCmdLine
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Cryptbot, PrivateLoader, RedLine, Tofsee
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Contains functionality to steal Chrome passwords or cookies
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Detected VMProtect packer
Disable Windows Defender real time protection (registry)
Drops PE files to the document folder of the user
Drops PE files with a suspicious file extension
Found C&C like URL pattern
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Performs DNS queries to domains with low reputation
Query firmware table information (likely to detect VMs)
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Uses known network protocols on non-standard ports
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Writes to foreign memory regions
Yara detected Cryptbot
Yara detected Generic Downloader
Yara detected PrivateLoader
Yara detected RedLine Stealer
Yara detected Tofsee
Yara detected Vidar stealer
Yara Genericmalware
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 730452 Sample: 93AC84D519EDB6350CF53736449... Startdate: 25/10/2022 Architecture: WINDOWS Score: 100 126 g.agametog.com 2->126 166 Snort IDS alert for network traffic 2->166 168 Malicious sample detected (through community Yara rule) 2->168 170 Antivirus detection for URL or domain 2->170 172 21 other signatures 2->172 13 93AC84D519EDB6350CF53736449330985FE1CB52EFF04.exe 17 2->13         started        16 svchost.exe 2->16         started        19 svchost.exe 2->19         started        21 6 other processes 2->21 signatures3 process4 file5 118 C:\Users\user\AppData\...\setup_install.exe, PE32 13->118 dropped 120 C:\Users\user\AppData\...\libwinpthread-1.dll, PE32 13->120 dropped 122 C:\Users\user\AppData\...\libstdc++-6.dll, PE32 13->122 dropped 124 12 other files (11 malicious) 13->124 dropped 23 setup_install.exe 1 13->23         started        164 Query firmware table information (likely to detect VMs) 16->164 signatures6 process7 dnsIp8 158 127.0.0.1 unknown unknown 23->158 160 hsiens.xyz 23->160 186 Multi AV Scanner detection for dropped file 23->186 188 Performs DNS queries to domains with low reputation 23->188 190 Adds a directory exclusion to Windows Defender 23->190 27 cmd.exe 1 23->27         started        29 cmd.exe 1 23->29         started        31 cmd.exe 1 23->31         started        34 9 other processes 23->34 signatures9 process10 signatures11 36 Sun16a363382a5.exe 27->36         started        41 Sun16be7a530c482.exe 29->41         started        204 Obfuscated command line found 31->204 206 Uses ping.exe to sleep 31->206 208 Drops PE files with a suspicious file extension 31->208 210 2 other signatures 31->210 43 powershell.exe 21 31->43         started        45 Sun165e1a9a5b6d67.exe 34->45         started        47 Sun16f0eb81a9f134ace.exe 12 34->47         started        49 Sun16d537c60c.exe 34->49         started        51 4 other processes 34->51 process12 dnsIp13 128 212.193.30.115, 49708, 49717, 80 SPD-NETTR Russian Federation 36->128 130 79.137.192.57, 49723, 49728, 80 PSKSET-ASRU Russian Federation 36->130 140 20 other IPs or domains 36->140 94 C:\Users\...\uDxInWkKXeMZQ1ek4TvV6rkC.exe, PE32 36->94 dropped 96 C:\Users\...\rsBN5UYymzE1uPV6D2itJnQP.exe, PE32 36->96 dropped 98 C:\Users\...\rWvSZZBlc_uxlqgSOEfwtNhc.exe, PE32 36->98 dropped 100 20 other malicious files 36->100 dropped 174 Antivirus detection for dropped file 36->174 176 Multi AV Scanner detection for dropped file 36->176 178 May check the online IP address of the machine 36->178 184 2 other signatures 36->184 53 JDx4FjX2m1cgdrMDUoQ8Yj1F.exe 36->53         started        57 XNFBmuo2ZP9JLF7UEQCDFkNn.exe 36->57         started        60 5CSgFZnTZ8sk5otkAbvP3weE.exe 36->60         started        72 7 other processes 36->72 62 cmd.exe 41->62         started        64 dllhost.exe 41->64         started        132 ip-api.com 208.95.112.1, 49709, 80 TUT-ASUS United States 45->132 180 Contains functionality to steal Chrome passwords or cookies 45->180 134 eduarroma.tumblr.com 74.114.154.18, 443, 49712 AUTOMATTICUS Canada 47->134 182 Machine Learning detection for dropped file 47->182 66 WerFault.exe 47->66         started        68 explorer.exe 49->68 injected 136 cdn.discordapp.com 162.159.130.233, 443, 49704, 49714 CLOUDFLARENETUS United States 51->136 138 162.159.135.233 CLOUDFLARENETUS United States 51->138 70 Sun16b474c952015e.exe 51->70         started        file14 signatures15 process16 dnsIp17 144 49.12.226.201 HETZNER-ASDE Germany 53->144 146 telegram.org 149.154.167.99 TELEGRAMRU United Kingdom 53->146 148 163.123.143.4 ILIGHT-NETUS Reserved 53->148 102 C:\Users\...\xP3kyD045u0xGlitq6Pnl1h4.exe, PE32 53->102 dropped 104 C:\Users\...\6UKW3h699PiUWbHOl6Hb2soy.exe, MS-DOS 53->104 dropped 106 C:\Users\user\AppData\...\Service[1].bmp, MS-DOS 53->106 dropped 114 2 other malicious files 53->114 dropped 192 Writes to foreign memory regions 57->192 194 Allocates memory in foreign processes 57->194 196 Injects a PE file into a foreign processes 57->196 74 cmd.exe 62->74         started        78 conhost.exe 62->78         started        80 rundll32.exe 68->80         started        154 2 other IPs or domains 70->154 82 conhost.exe 70->82         started        150 45.136.151.102 ENZUINC-US Latvia 72->150 152 star-mini.c10r.facebook.com 157.240.17.35 FACEBOOKUS United States 72->152 156 3 other IPs or domains 72->156 108 C:\Users\user\AppData\Local\Temp\lwFbRE.cE, PE32 72->108 dropped 110 C:\Users\user\AppData\Local\...\acfqlfuv.exe, PE32 72->110 dropped 112 C:\...\ClipManager_Svc.exe, PE32 72->112 dropped 198 Tries to harvest and steal browser information (history, passwords, etc) 72->198 file18 signatures19 process20 file21 116 C:\Users\user\AppData\Local\...\Amica.exe.com, PE32 74->116 dropped 200 Obfuscated command line found 74->200 202 Uses ping.exe to sleep 74->202 84 PING.EXE 74->84         started        87 Amica.exe.com 74->87         started        89 findstr.exe 74->89         started        signatures22 process23 dnsIp24 142 192.168.2.3, 443, 49697, 49698 unknown unknown 84->142 91 Amica.exe.com 87->91         started        process25 dnsIp26 162 PytQCMKaAKhjsodsMbwt.PytQCMKaAKhjsodsMbwt 91->162
Threat name:
Win32.Trojan.Redlinestealer
Status:
Malicious
First seen:
2022-10-13 23:32:00 UTC
File Type:
PE (Exe)
Extracted files:
208
AV detection:
21 of 26 (80.77%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
Score:
  10/10
Tags:
family:fabookie family:nullmixer family:nymaim family:privateloader family:redline family:smokeloader family:tofsee family:vidar botnet:1 botnet:1310 botnet:6.4 botnet:706 botnet:937 botnet:logsdiller cloud (tg: @logsdillabot) botnet:new10251 botnet:pub1 aspackv2 backdoor dropper evasion infostealer loader main persistence spyware stealer trojan upx vmprotect
Behaviour
Checks SCSI registry key(s)
Creates scheduled task(s)
Delays execution with timeout.exe
Kills process with taskkill
Modifies system certificate store
Runs ping.exe
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Launches sc.exe
Adds Run key to start application
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
Uses the VBS compiler for execution
ASPack v2.12-2.42
Creates new service(s)
Downloads MZ/PE file
Executes dropped EXE
Modifies Windows Firewall
UPX packed file
VMProtect packed file
Vidar Stealer
Detect Fabookie payload
Detects Smokeloader packer
Fabookie
Modifies Windows Defender Real-time Protection settings
NullMixer
NyMaim
PrivateLoader
Process spawned unexpected child process
RedLine
RedLine payload
SmokeLoader
Tofsee
Vidar
Malware Config
C2 Extraction:
http://hsiens.xyz/
http://37.0.10.214/proxies.txt
http://37.0.10.244/server.txt
http://wfsdragon.ru/api/setStats.php
37.0.10.237
http://91.241.19.125/pub.php?pub=one
http://sarfoods.com/index.php
http://163.123.143.4/proxies.txt
http://107.182.129.251/server.txt
pastebin.com/raw/A7dSG1te
163.123.143.12
https://eduarroma.tumblr.com/
viacetequn.site:80
51.89.201.21:7161
45.139.105.171
85.31.46.167
103.89.90.61:34589
79.137.192.57:48771
denestyenol.xyz:81
exirdonanos.xyz:81
https://t.me/slivetalks
https://c.im/@xinibin420
80.76.51.172:19241
Gathering data
Unpacked files
SH256 hash:
feacf0ca0c6af0eba09c8e235527d1eb0979005051ef68abba1a38f7815c0f84
MD5 hash:
806c20eb3d12ef4ed586250503b66948
SHA1 hash:
92d0c7844988c60a21b8bbbeb55aa350a3499254
SH256 hash:
a18e5d223da775448e2e111101fe1f4ab919be801fd435d3a278718aa5e6ccba
MD5 hash:
0c6cae115465a83f05d3ff391fd009ac
SHA1 hash:
066ea93bb540ae4be0d2e522d4bb59eec74053ad
Detections:
win_vidar_auto
SH256 hash:
8963306b8dc579e19514edd491facb365cd40e16aaeecd475f2c355a724272bc
MD5 hash:
400653e50c7a17bba9549b6a191c0a1f
SHA1 hash:
11a7ce981de51465001bc0dfb3c348b4f2284d84
SH256 hash:
8a50b4a3ca9075a5e08e3f806db877c1b88305d13ba351276beed4a6fec8dd26
MD5 hash:
e75e1440eb164e13fa365e10ff894e7f
SHA1 hash:
0c24e02233a60a2eaeb293636c306d60acafe1ae
SH256 hash:
3001a2f2078c662d868c8893fac751274028d1b43ba3a8d96ae703a162d25892
MD5 hash:
896f2994b5067ca2dde8a62d8fc79328
SHA1 hash:
0230b505866ece8874ccf4a3fa939ff26be0ea77
SH256 hash:
1d24dd392f754611959be3f73ef761f77ac027db66d9c9b4a0d549cd53fdf14f
MD5 hash:
8eca3aae8fe042f19b5e96f8249232be
SHA1 hash:
f9b234ebda5e0aa01044e6cc079f88a81795c094
SH256 hash:
46956896149409eb9c981062bacefc4183942f617374ad928489525fb75abe91
MD5 hash:
218e17fd10d54d6ad560a4e3c5980947
SHA1 hash:
bdd02223fba6550634c248e4a6489577c84babca
Detections:
PrivateLoader win_privateloader_w0 win_privateloader_a0
SH256 hash:
bdd9bd0cd6ef4ff8fe3eb342a26b2807368168981ad7575bda97095f1daf92ce
MD5 hash:
cd735fe854e7d8ed00490e7ca2c90698
SHA1 hash:
9ef46b0895cab1cc4de70ee7e58d90c7ced4c232
SH256 hash:
53824f29cb013913de5ddf9a0d00f8704d68336af7e2f5b62656467f3f4f768c
MD5 hash:
3430e7461275db0da7bbab5767a42836
SHA1 hash:
5f889a40bfc42c384d86bc2ab741e87daf5e200c
SH256 hash:
ec51c04abac579846e6234bfa5f907fe3b8c779b134c770c21d82638b2e1f115
MD5 hash:
5a50e392fc93deaa98f0a4289ace5378
SHA1 hash:
3e0bfc2d135ff218d3a10f9858d910ec00db0ab9
SH256 hash:
b8dfe1a15b2caec235be0cd270dba5dbb1a0a7984ad29f1d1f5bd13b2cb669c7
MD5 hash:
611b8a82967725fae9deac1aa5367599
SHA1 hash:
a262f8cba9be7faee52ce4cca2ca9fb2fba979b4
SH256 hash:
701cdf0cde5950c5a75b07c1993f3c3ad93b52119e324be3a6cf715f4a7f618b
MD5 hash:
bb00d01e6f9183c749c2c5825bccdb8e
SHA1 hash:
d6eb2c29d0cb8bcf62cc8255ab2bed5dc85a6a1a
SH256 hash:
acc60df3f100889a9be4ed8e522e9dbc50b89e8648d6528178c23769100f5e56
MD5 hash:
7d2935e9538ccf08734e0eb30ffdaf24
SHA1 hash:
eebe31928361496c58dd594498ee2e24b0567ab7
SH256 hash:
ef869b9cef3c4ec5c939b0db1cfea9153256134a20f3b089291363ee6ff929f0
MD5 hash:
5cbb5b3d68276b3ac4565547e236326f
SHA1 hash:
960a47446fd4b1dcfce69b8dc95399713abba751
Detections:
PrivateLoader win_privateloader_w0 win_privateloader_a0
SH256 hash:
e6ba2c6e75c272d4b7aa2599433241fd2509f04b2d742a6fde1e509e13ef6160
MD5 hash:
a72772cc1d575fe9451d23c3d1450290
SHA1 hash:
e271b3cd62166a7b15cd3c70c2aae862a90ee792
SH256 hash:
93ac84d519edb6350cf53736449330985fe1cb52eff043857daf6cca916d6fa3
MD5 hash:
bebfa25ff4e87540fd63b3c49cde912d
SHA1 hash:
8264a0c923f846422be4fb6d29991b091c034362
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:command_and_control
Author:CD_R0M_
Description:This rule searches for common strings found by malware using C2. Based on a sample used by a Ransomware group
Rule name:INDICATOR_EXE_Packed_ASPack
Author:ditekSHen
Description:Detects executables packed with ASPack
Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation
Author:ditekSHen
Description:Detects executables containing potential Windows Defender anti-emulation checks
Rule name:MALWARE_Win_DLInjector03
Author:ditekSHen
Description:Detects unknown loader / injector
Rule name:MALWARE_Win_DLInjector06
Author:ditekSHen
Description:Detects downloader / injector
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:MALWARE_Win_Vidar
Author:ditekSHen
Description:Detects Vidar / ArkeiStealer
Rule name:privateloader
Author:andretavare5
Description:PrivateLoader pay-per-install malware
Rule name:Privateloader_Main_Component
Description:Detects PrivateLoader Main Component
Rule name:RedOctoberPluginCollectInfo
Rule name:Windows_Trojan_Smokeloader_3687686f
Author:Elastic Security
Rule name:Windows_Trojan_Vidar_114258d5
Author:Elastic Security
Rule name:Windows_Trojan_Vidar_9007feb2
Author:Elastic Security
Rule name:win_privateloader
Rule name:win_privateloader_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.privateloader.
Rule name:win_privateloader_w0
Author:andretavare5
Reference:https://tavares.re/blog/2022/06/06/hunting-privateloader-pay-per-install-service
Rule name:win_vidar_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.vidar.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments