MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 dad9e695e9f592e48326dd349556f81987c115ad152bf3433f12d969135d943a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



PrivateLoader


Vendor detections: 18


Intelligence 18 IOCs YARA File information Comments

SHA256 hash: dad9e695e9f592e48326dd349556f81987c115ad152bf3433f12d969135d943a
SHA3-384 hash: ef6e64b5d030f2303c72cf2a4d32107f653dff1a01c26deda0d39b56c3cf0e9404be4028f3ec84253f944c40f9c45f0a
SHA1 hash: 74be7d963aa3fa076e2119cebc5ee4a246069941
MD5 hash: 008ad6f06b42fa51f990a67d08a39cae
humanhash: bravo-jupiter-kentucky-louisiana
File name:DAD9E695E9F592E48326DD349556F81987C115AD152BF.exe
Download: download sample
Signature PrivateLoader
File size:3'470'689 bytes
First seen:2023-02-04 21:10:11 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 101 x GuLoader, 64 x DiamondFox)
ssdeep 98304:JhZ2y+lmG4JJsHf608xmtdOVTjQwiH11XD9ml7Js1NR8:Jh0y+lmzJJY6dm7Ol9M11XD8l7Js1o
Threatray 1'573 similar samples on MalwareBazaar
TLSH T14DF533D1E2DAC0FFE83126B458990FB0FF7282009964576F53502E7DA944AD0AAD5E3F
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla)
Reporter abuse_ch
Tags:exe PrivateLoader


Avatar
abuse_ch
PrivateLoader C2:
51.89.207.166:47909

Intelligence


File Origin
# of uploads :
1
# of downloads :
233
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
DAD9E695E9F592E48326DD349556F81987C115AD152BF.exe
Verdict:
Malicious activity
Analysis date:
2023-02-04 21:11:42 UTC
Tags:
evasion trojan stealer vidar loader smoke redline socelars opendir rat

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %temp% directory
Сreating synchronization primitives
Creating a process from a recently created file
Creating a file
Moving a recently created file
Running batch commands
Sending a custom TCP request
DNS request
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Creating a process with a hidden window
Creating a window
Sending an HTTP GET request
Reading critical registry keys
Unauthorized injection to a recently created process
Query of malicious DNS domain
Sending a TCP request to an infection source
Unauthorized injection to a system process
Sending an HTTP GET request to an infection source
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
mokes overlay packed shell32.dll zusy
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Fabookie, PrivateLoader, Raccoon Stealer
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large strings
.NET source code references suspicious native API functions
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Changes security center settings (notifications, updates, antivirus, firewall)
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Detected VMProtect packer
Disable Windows Defender real time protection (registry)
Drops PE files to the document folder of the user
Found C&C like URL pattern
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
May check the online IP address of the machine
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Performs DNS queries to domains with low reputation
Performs DNS TXT record lookups
Queries the IP of a very long domain name
Query firmware table information (likely to detect VMs)
Sample uses process hollowing technique
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to resolve many domain names, but no domain seems valid
Uses STUN server to do NAT traversial
Uses TOR for connection hidding
Yara detected Fabookie
Yara detected Generic Downloader
Yara detected PrivateLoader
Yara detected Raccoon Stealer v2
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Vidar stealer
Yara detected zgRAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 798614 Sample: DAD9E695E9F592E48326DD34955... Startdate: 04/02/2023 Architecture: WINDOWS Score: 100 131 live.goatgame.live 2->131 133 cdn.discordapp.com 2->133 135 4 other IPs or domains 2->135 169 Snort IDS alert for network traffic 2->169 171 Multi AV Scanner detection for domain / URL 2->171 173 Malicious sample detected (through community Yara rule) 2->173 179 27 other signatures 2->179 12 DAD9E695E9F592E48326DD349556F81987C115AD152BF.exe 10 2->12         started        15 svchost.exe 2->15         started        18 svchost.exe 2->18         started        20 6 other processes 2->20 signatures3 175 Tries to resolve many domain names, but no domain seems valid 131->175 177 Uses STUN server to do NAT traversial 133->177 process4 file5 129 C:\Users\user\AppData\...\setup_installer.exe, PE32 12->129 dropped 22 setup_installer.exe 17 12->22         started        239 Query firmware table information (likely to detect VMs) 15->239 241 Changes security center settings (notifications, updates, antivirus, firewall) 18->241 signatures6 process7 file8 81 C:\Users\user\AppData\...\setup_install.exe, PE32 22->81 dropped 83 C:\Users\user\AppData\Local\...\sahiba_9.txt, PE32 22->83 dropped 85 C:\Users\user\AppData\Local\...\sahiba_8.txt, PE32 22->85 dropped 87 12 other files (11 malicious) 22->87 dropped 181 Multi AV Scanner detection for dropped file 22->181 26 setup_install.exe 1 22->26         started        signatures9 process10 dnsIp11 165 watira.xyz 26->165 167 127.0.0.1 unknown unknown 26->167 121 C:\Users\user\AppData\...\sahiba_9.exe (copy), PE32 26->121 dropped 123 C:\Users\user\AppData\...\sahiba_8.exe (copy), PE32 26->123 dropped 125 C:\Users\user\AppData\...\sahiba_7.exe (copy), PE32 26->125 dropped 127 6 other malicious files 26->127 dropped 233 Multi AV Scanner detection for dropped file 26->233 235 Detected unpacking (changes PE section rights) 26->235 237 Performs DNS queries to domains with low reputation 26->237 31 cmd.exe 26->31         started        33 cmd.exe 1 26->33         started        35 cmd.exe 26->35         started        37 8 other processes 26->37 file12 signatures13 process14 process15 39 sahiba_7.exe 31->39         started        44 sahiba_2.exe 33->44         started        46 sahiba_9.exe 35->46         started        48 sahiba_6.exe 37->48         started        50 sahiba_5.exe 37->50         started        52 sahiba_8.exe 37->52         started        54 3 other processes 37->54 dnsIp16 137 ipinfo.io 39->137 139 212.193.30.115, 49722, 80 SPD-NETTR Russian Federation 39->139 143 18 other IPs or domains 39->143 89 C:\Users\...\xUpk2h43ljpwMdJUjvHu96TF.exe, PE32+ 39->89 dropped 91 C:\Users\...\rNxgfbBmtpXdy5xGIMq5mk0z.exe, PE32 39->91 dropped 93 C:\Users\...\qaUJh0wc6ZTGjJjcJubu1s8W.exe, PE32 39->93 dropped 101 13 other malicious files 39->101 dropped 183 Drops PE files to the document folder of the user 39->183 185 May check the online IP address of the machine 39->185 187 Creates HTML files with .exe extension (expired dropper behavior) 39->187 203 2 other signatures 39->203 56 rNxgfbBmtpXdy5xGIMq5mk0z.exe 39->56         started        61 ZlusS6PDS4RVX6_jGvGirw0_.exe 39->61         started        63 RLdogfrVURn0qRgchMB3EvG4.exe 39->63         started        65 f9eXv63BJjcdxIq9If3iBfsa.exe 39->65         started        189 Detected unpacking (changes PE section rights) 44->189 191 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 44->191 193 Maps a DLL or memory area into another process 44->193 205 2 other signatures 44->205 67 explorer.exe 44->67 injected 141 f.youtuuee.com 46->141 145 2 other IPs or domains 46->145 95 C:\Users\user\AppData\...\jfiag3g_gg.exe, PE32 46->95 dropped 73 8 other processes 46->73 147 2 other IPs or domains 48->147 195 Performs DNS queries to domains with low reputation 48->195 97 C:\Users\user\AppData\Local\...\sahiba_5.tmp, PE32 50->97 dropped 197 Obfuscated command line found 50->197 69 sahiba_5.tmp 50->69         started        99 C:\Users\user\AppData\Local\...\sahiba_8.tmp, PE32 52->99 dropped 71 sahiba_8.tmp 52->71         started        149 2 other IPs or domains 54->149 199 Detected unpacking (overwrites its own PE header) 54->199 75 2 other processes 54->75 file17 201 Tries to resolve many domain names, but no domain seems valid 141->201 signatures18 process19 dnsIp20 157 4 other IPs or domains 56->157 103 C:\Users\...\DbAtFaMrd72m9JpAtaAgBv2Q.exe, PE32 56->103 dropped 105 C:\Users\user\AppData\Local\...\WW14[1].exe, PE32 56->105 dropped 207 Multi AV Scanner detection for dropped file 56->207 209 Drops PE files to the document folder of the user 56->209 211 May check the online IP address of the machine 56->211 213 Creates HTML files with .exe extension (expired dropper behavior) 56->213 229 2 other signatures 61->229 215 Detected unpacking (changes PE section rights) 63->215 217 Detected unpacking (overwrites its own PE header) 63->217 107 C:\Users\...\f9eXv63BJjcdxIq9If3iBfsa.tmp, PE32 65->107 dropped 151 thegymmum.com 67->151 159 5 other IPs or domains 67->159 109 C:\Users\user\AppData\Roaming\btgscfe, PE32 67->109 dropped 219 System process connects to network (likely due to code injection or exploit) 67->219 221 Benign windows process drops PE files 67->221 223 Hides that the sample has been downloaded from the Internet (zone.identifier) 67->223 77 svchost.exe 67->77         started        161 2 other IPs or domains 69->161 111 C:\Users\user\AppData\Local\Temp\...\idp.dll, PE32 69->111 dropped 113 C:\Users\user\AppData\Local\...\_shfoldr.dll, PE32 69->113 dropped 115 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 69->115 dropped 163 2 other IPs or domains 71->163 117 C:\Users\user\AppData\Local\Temp\...\idp.dll, PE32 71->117 dropped 119 2 other files (none is malicious) 71->119 dropped 153 live.goatgame.live 75->153 155 liezaphare.xyz 75->155 79 conhost.exe 75->79         started        file21 225 Performs DNS TXT record lookups 153->225 227 Tries to resolve many domain names, but no domain seems valid 153->227 231 2 other signatures 153->231 signatures22 process23
Threat name:
Win32.Ransomware.Aicat
Status:
Malicious
First seen:
2021-07-31 11:08:52 UTC
File Type:
PE (Exe)
Extracted files:
173
AV detection:
28 of 38 (73.68%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:fabookie family:nullmixer family:privateloader family:redline family:sectoprat family:smokeloader family:vidar botnet:706 botnet:aniold aspackv2 backdoor dropper evasion infostealer loader rat spyware stealer trojan upx
Behaviour
Checks SCSI registry key(s)
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
ASPack v2.12-2.42
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
UPX packed file
Nirsoft
Vidar Stealer
Detect Fabookie payload
Detects Smokeloader packer
Fabookie
Modifies Windows Defender Real-time Protection settings
NullMixer
PrivateLoader
RedLine
RedLine payload
SectopRAT
SectopRAT payload
SmokeLoader
Vidar
Malware Config
C2 Extraction:
http://watira.xyz/
https://xeronxikxxx.tumblr.com/
liezaphare.xyz:80
Unpacked files
SH256 hash:
0c2ade2993927f6de828e30c07156c19751b55650a05c965631ca0ea1c983498
MD5 hash:
cc0d6b6813f92dbf5be3ecacf44d662a
SHA1 hash:
b968c57a14ddada4128356f6e39fb66c6d864d3f
SH256 hash:
55361941ab12c7edd987c706d25423d868f756fab1028d99eeffacdabf3da4ca
MD5 hash:
4de4b7bc0a92902422c4204fcfa58150
SHA1 hash:
587e0299ea32cc836281998941daa60f471e3480
SH256 hash:
40ca14be87ccee1c66cce8ce07d7ed9b94a0f7b46d84f9147c4bbf6ddab75a67
MD5 hash:
7165e9d7456520d1f1644aa26da7c423
SHA1 hash:
177f9116229a021e24f80c4059999c4c52f9e830
SH256 hash:
edd2a0334bfcf63a8c9b9d3a148fd6ad7f76a757ea56589b0670cb72d7dce6ff
MD5 hash:
ad6992e6f028f1f9cd8714ad4cf5313e
SHA1 hash:
f837082d106727a30ff849ed3838da6cfdd4b29c
SH256 hash:
64dcc8dea7aae1a262ad38bbf554db3fbfd28d1852f489fab8a5bdb117e58205
MD5 hash:
2ee6b800326d0207b521b7f95140eb11
SHA1 hash:
011db5f3702750d1cc003f3e02c5737e1184ef25
SH256 hash:
7d7d5ae0fa9286fea65a6f94240389998ff0d08340a2aedc67ef3547e84d64c6
MD5 hash:
270dd1da0ab7f38cdff6fab84562ec7a
SHA1 hash:
cf7be169ee4415085baeb4aeaa60932ac5abf4ac
SH256 hash:
4df50c6d6d188c3413bdba53851cbeea7b281b92b0d5341c021a65912395fa5b
MD5 hash:
3011f2257b899aa8196e02447383a46b
SHA1 hash:
cb90ff25622aa5e5e20e257f6c6cb3ce58bd6940
Detections:
PrivateLoader win_privateloader_w0 win_privateloader_a0
SH256 hash:
d0812c78e146d7774b25061dbdabae004fefc503ea363b441fa691add1eef26b
MD5 hash:
255aac71617edb0cc31709ef30fbee0a
SHA1 hash:
98ef84fd1e1cc4ff60a52bab85d00db7093a8f01
SH256 hash:
392b00fc8b5a49b2ba3545eb490fc0c5040fb18a6f330d102ca06d8390183bb9
MD5 hash:
5a81c749a3f9285f10899f0969519475
SHA1 hash:
2d960778cba6667f630d5bbca8a4482885b0941a
SH256 hash:
da72fa2ad767e22db3d55506846b5d4db7932cd7287391c483faa80c5e86bcce
MD5 hash:
eb73f48eaf544bf7e035a58f95f73394
SHA1 hash:
251f0d09f14452538ecfa0924a4618c3c16887e3
SH256 hash:
78958d664b1c140f2b45e56c4706108eeb5f14756977e2efd3409f8a788d3c98
MD5 hash:
c0d18a829910babf695b4fdaea21a047
SHA1 hash:
236a19746fe1a1063ebe077c8a0553566f92ef0f
SH256 hash:
7e1282097df8513b7a380803f31386373c178bb97102862d6a08816c0a8902f4
MD5 hash:
4fa4a626bfe65bbb3ba048e66170556a
SHA1 hash:
05e0beeedc4a183056292c36cc87a9822f3a19af
SH256 hash:
e1cc6a9d780602fe6e789bf5c3a27e87e197a4e3bf7c8138ea2f9dfec70fb963
MD5 hash:
f707252b9c9579677fffb013e0cfc646
SHA1 hash:
8ab483023fa8773afb8c13464c39c5b8e687f126
SH256 hash:
e427f8ef21691e3d8c2313d11129ad08ddef69a158eca2f77c170603478ff0c4
MD5 hash:
0dedd909aae9aa0a89b4422106310e9e
SHA1 hash:
271d36afa5b729ee590cf8066166ca5e9c9d0340
SH256 hash:
a44daa993632ffb1fb4a1faf7b290318d07bb242a081230578e67fcba57615ba
MD5 hash:
668960d5d4afb0024cb967cf6b495673
SHA1 hash:
14ca4cdbd4a07d0fac894c0f3f01c9ab5d2d50d0
SH256 hash:
3fd6677befd1b3992a15e2202b0995e32ebd99eb6ebfa4a2dd7e0ede78ca1dd4
MD5 hash:
cc7121b607d70c0e2b59b3cb7957921b
SHA1 hash:
d56ab7eb6cfe892d3f36ab4795dff8d660c14a4f
SH256 hash:
dad9e695e9f592e48326dd349556f81987c115ad152bf3433f12d969135d943a
MD5 hash:
008ad6f06b42fa51f990a67d08a39cae
SHA1 hash:
74be7d963aa3fa076e2119cebc5ee4a246069941
Malware family:
RedLine.A
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments