MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e1883a0c617691548b66692cfb156c140068f0ee52aed4e54412f1423bc87551. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



PrivateLoader


Vendor detections: 12


Intelligence 12 IOCs YARA 3 File information Comments

SHA256 hash: e1883a0c617691548b66692cfb156c140068f0ee52aed4e54412f1423bc87551
SHA3-384 hash: cfbd10418a760915efd46bfa1aa888835f0d3266a9dcde5b032088011e9c84cde342952f2703ec0bb65abdb52373cfaa
SHA1 hash: 0a5586f3469e5542abfa219dcc598d4a99399ed7
MD5 hash: 58aea673e9856bc14ca1e8d667d36568
humanhash: mississippi-emma-robin-delta
File name:SecuriteInfo.com.Trojan.Siggen28.47309.32751.2518
Download: download sample
Signature PrivateLoader
File size:4'360'192 bytes
First seen:2024-05-16 06:20:35 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 1ba19d25372b3cb9b6f9bdd416ebf12c (4 x PrivateLoader, 1 x LummaStealer)
ssdeep 98304:O8w9fZvDYOoom4fkJPErCMrqMExfK521rO4KISvQq:OjFZvDYOR/qMeMmNBfi441
TLSH T1061633DFA3932BB6D405DC3218FE95F87BB24E8C4D7903266B7027B7EF256A15809241
TrID 50.0% (.EXE) Generic Win/DOS Executable (2002/3)
49.9% (.EXE) DOS Executable Generic (2000/1)
File icon (PE):PE icon
dhash icon e0f0b0b0789ae4b4 (1 x PrivateLoader)
Reporter SecuriteInfoCom
Tags:exe PrivateLoader

Intelligence


File Origin
# of uploads :
1
# of downloads :
375
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
e1883a0c617691548b66692cfb156c140068f0ee52aed4e54412f1423bc87551.exe
Verdict:
Malicious activity
Analysis date:
2024-05-16 06:23:49 UTC
Tags:
evasion privateloader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Gathering data
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for analyzing tools
Searching for the window
Сreating synchronization primitives
Modifying a system file
DNS request
Using the Windows Management Instrumentation requests
Connection attempt
Sending a custom TCP request
Replacing files
Sending an HTTP GET request
Launching a service
Launching a process
Reading critical registry keys
Sending a UDP request
Forced system process termination
Blocking the Windows Defender launch
Connection attempt to an infection source
Adding exclusions to Windows Defender
Sending an HTTP GET request to an infection source
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
lolbin masquerade mpress packed packed packed shell32 themidawinlicense
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
CryptOne, Mars Stealer, PureLog Stealer,
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains very large array initializations
Adds extensions / path to Windows Defender exclusion list (Registry)
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Creates HTML files with .exe extension (expired dropper behavior)
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender real time protection (registry)
Disables Windows Defender (deletes autostart)
Drops PE files to the document folder of the user
Exclude list of file types from scheduled, custom, and real-time scanning
Found direct / indirect Syscall (likely to bypass EDR)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found stalling execution ending in API Sleep call
Hides threads from debuggers
Injects a PE file into a foreign processes
Installs new ROOT certificates
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Modifies Group Policy settings
Modifies power options to not sleep / hibernate
Modifies Windows Defender protection settings
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
PE file has nameless sections
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses process hollowing technique
Sample uses string decryption to hide its real strings
Sigma detected: Disable power options
Suspicious powershell command line found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to download and execute files (via powershell)
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Uses powercfg.exe to modify the power settings
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected CryptOne packer
Yara detected Mars stealer
Yara detected Powershell download and execute
Yara detected PureLog Stealer
Yara detected RedLine Stealer
Yara detected RisePro Stealer
Yara detected Stealc
Yara detected UAC Bypass using CMSTP
Yara detected Vidar stealer
Yara detected zgRAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1442434 Sample: SecuriteInfo.com.Trojan.Sig... Startdate: 16/05/2024 Architecture: WINDOWS Score: 100 142 Multi AV Scanner detection for domain / URL 2->142 144 Found malware configuration 2->144 146 Malicious sample detected (through community Yara rule) 2->146 148 25 other signatures 2->148 10 SecuriteInfo.com.Trojan.Siggen28.47309.32751.2518.exe 11 56 2->10         started        15 MPGPH131.exe 2->15         started        17 svchost.exe 2->17         started        19 3 other processes 2->19 process3 dnsIp4 128 94.232.45.38 WELLWEBNL Russian Federation 10->128 130 93.186.225.194 VKONTAKTE-SPB-AShttpvkcomRU Russian Federation 10->130 132 20 other IPs or domains 10->132 112 C:\Users\...\sM6UmohAA71uiHsDAlC51h9v.exe, PE32 10->112 dropped 114 C:\Users\...\sJlRGrk8i3Q84wrCWjW_3qv5.exe, PE32 10->114 dropped 116 C:\Users\...\olZh4mXNqVNC0SrIRlFH5eUP.exe, PE32 10->116 dropped 118 25 other malicious files 10->118 dropped 190 Query firmware table information (likely to detect VMs) 10->190 192 Drops PE files to the document folder of the user 10->192 194 Tries to detect sandboxes and other dynamic analysis tools (window names) 10->194 200 11 other signatures 10->200 21 7srdi6urV9g45ZFWEyjj3Mjd.exe 10->21         started        24 olZh4mXNqVNC0SrIRlFH5eUP.exe 10->24         started        27 AgBpwJw9_U2wNWosH_G7qcng.exe 10->27         started        30 13 other processes 10->30 196 Multi AV Scanner detection for dropped file 15->196 198 Machine Learning detection for dropped file 15->198 file5 signatures6 process7 dnsIp8 94 C:\Users\...\7srdi6urV9g45ZFWEyjj3Mjd.tmp, PE32 21->94 dropped 32 7srdi6urV9g45ZFWEyjj3Mjd.tmp 21->32         started        166 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 24->166 168 Writes to foreign memory regions 24->168 170 Allocates memory in foreign processes 24->170 172 Injects a PE file into a foreign processes 24->172 35 RegAsm.exe 24->35         started        39 RegAsm.exe 24->39         started        41 conhost.exe 24->41         started        134 185.172.128.151 NADYMSS-ASRU Russian Federation 27->134 96 C:\Users\user\AppData\...\softokn3[1].dll, PE32 27->96 dropped 98 C:\Users\user\AppData\Local\...\nss3[1].dll, PE32 27->98 dropped 100 C:\Users\user\AppData\...\mozglue[1].dll, PE32 27->100 dropped 108 9 other files (5 malicious) 27->108 dropped 174 Detected unpacking (changes PE section rights) 27->174 176 Detected unpacking (overwrites its own PE header) 27->176 178 Found many strings related to Crypto-Wallets (likely being stolen) 27->178 186 4 other signatures 27->186 136 5.42.96.54 RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU Russian Federation 30->136 138 5.42.96.55 RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU Russian Federation 30->138 140 3 other IPs or domains 30->140 102 C:\Users\user\...\VZhOkBlq6DYIgkRxaqbY.exe, PE32 30->102 dropped 104 C:\Users\user\...\Bpr3HwQYeKVfcyoUsXKu.exe, PE32 30->104 dropped 106 C:\Users\user\AppData\Local\...\INetC.dll, PE32 30->106 dropped 110 17 other malicious files 30->110 dropped 180 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 30->180 182 Tries to steal Mail credentials (via file / registry access) 30->182 184 Found stalling execution ending in API Sleep call 30->184 188 10 other signatures 30->188 43 cmd.exe 30->43         started        45 Install.exe 30->45         started        47 RegAsm.exe 30->47         started        49 10 other processes 30->49 file9 signatures10 process11 dnsIp12 74 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 32->74 dropped 76 C:\Users\user\AppData\Local\...\_iscrypt.dll, PE32 32->76 dropped 78 C:\Users\user\AppData\Local\...\_RegDLL.tmp, PE32 32->78 dropped 88 34 other files (23 malicious) 32->88 dropped 51 glorytxvoice.exe 32->51         started        120 95.217.240.101 HETZNER-ASDE Germany 35->120 122 23.61.62.148 AKAMAI-ASUS United States 35->122 80 C:\Users\user\AppData\...\softokn3[1].dll, PE32 35->80 dropped 82 C:\Users\user\AppData\Local\...\nss3[1].dll, PE32 35->82 dropped 84 C:\Users\user\AppData\...\mozglue[1].dll, PE32 35->84 dropped 90 10 other files (6 malicious) 35->90 dropped 150 Tries to harvest and steal browser information (history, passwords, etc) 35->150 152 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 39->152 154 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 39->154 156 Suspicious powershell command line found 43->156 158 Tries to download and execute files (via powershell) 43->158 54 powershell.exe 43->54         started        58 conhost.exe 43->58         started        86 C:\Users\user\AppData\Local\...\Install.exe, PE32 45->86 dropped 60 Install.exe 45->60         started        124 5.42.65.85 RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU Russian Federation 47->124 160 Installs new ROOT certificates 47->160 62 conhost.exe 49->62         started        64 conhost.exe 49->64         started        66 conhost.exe 49->66         started        68 5 other processes 49->68 file13 signatures14 process15 dnsIp16 92 C:\ProgramData\...\TLocalStream 4.13.66.exe, PE32 51->92 dropped 126 18.239.229.31 AMAZON-02US United States 54->126 162 Installs new ROOT certificates 54->162 164 Modifies Windows Defender protection settings 60->164 70 cmd.exe 60->70         started        file17 signatures18 process19 process20 72 conhost.exe 70->72         started       
Threat name:
Win64.Trojan.Midie
Status:
Malicious
First seen:
2024-05-15 13:43:06 UTC
File Type:
PE+ (Exe)
Extracted files:
8
AV detection:
16 of 24 (66.67%)
Threat level:
  5/5
Result
Malware family:
privateloader
Score:
  10/10
Tags:
family:privateloader evasion loader themida trojan
Behaviour
Modifies system certificate store
Drops file in System32 directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Checks whether UAC is enabled
Looks up external IP address via web service
Checks BIOS information in registry
Themida packer
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Modifies firewall policy service
PrivateLoader
Unpacked files
SH256 hash:
e1883a0c617691548b66692cfb156c140068f0ee52aed4e54412f1423bc87551
MD5 hash:
58aea673e9856bc14ca1e8d667d36568
SHA1 hash:
0a5586f3469e5542abfa219dcc598d4a99399ed7
Detections:
INDICATOR_EXE_Packed_Themida INDICATOR_EXE_Packed_MPress
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_MPress
Author:ditekSHen
Description:Detects executables built or packed with MPress PE compressor
Rule name:INDICATOR_EXE_Packed_Themida
Author:ditekSHen
Description:Detects executables packed with Themida
Rule name:TeslaCryptPackedMalware

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

PrivateLoader

Executable exe e1883a0c617691548b66692cfb156c140068f0ee52aed4e54412f1423bc87551

(this sample)

  
Delivery method
Distributed via web download

Comments