MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e461562a06f4c2cea8cc91d9fc6fd75f393b79030d6463169f71b0ff2f6b7ded. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



PrivateLoader


Vendor detections: 19


Intelligence 19 IOCs YARA 15 File information Comments

SHA256 hash: e461562a06f4c2cea8cc91d9fc6fd75f393b79030d6463169f71b0ff2f6b7ded
SHA3-384 hash: fec6e275859c9de1727f005c416e081953ea36e497c5d249ca8838c936824c9b12bee351873dce2fd825c8f611437fb1
SHA1 hash: 07ef2f949e1cdbba996ded863cb21580292987fc
MD5 hash: 0b682a6f8bd47a562e84e3359400a89d
humanhash: april-earth-indigo-lake
File name:E461562A06F4C2CEA8CC91D9FC6FD75F393B79030D646.exe
Download: download sample
Signature PrivateLoader
File size:2'642'186 bytes
First seen:2023-03-25 10:50:42 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 101 x GuLoader, 64 x DiamondFox)
ssdeep 49152:EgK4ulwaGABcgp2FFQNR7QW+hIw9/2mniPJz2bzm5sihPpK6ky4Me2H:JKZ+aGA3poAaH9umihB5siWtP2H
Threatray 297 similar samples on MalwareBazaar
TLSH T1FDC5338B16BDE8F1F6C22437E94B14321974DE2024ECD7C96BA58F80269E3D4A79513F
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla)
Reporter abuse_ch
Tags:exe PrivateLoader


Avatar
abuse_ch
PrivateLoader C2:
193.233.20.32:4125

Intelligence


File Origin
# of uploads :
1
# of downloads :
315
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
E461562A06F4C2CEA8CC91D9FC6FD75F393B79030D646.exe
Verdict:
Malicious activity
Analysis date:
2023-03-25 10:56:50 UTC
Tags:
evasion privateloader loader smoke trojan stealer vidar socelars rat redline tofsee miner amadey

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Сreating synchronization primitives
Creating a process from a recently created file
Creating a file
Searching for the window
Moving a recently created file
Running batch commands
Sending a custom TCP request
DNS request
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Sending an HTTP GET request
Launching a process
Creating a process with a hidden window
Unauthorized injection to a recently created process
Query of malicious DNS domain
Unauthorized injection to a system process
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
arkeistealer barys btcware exploit overlay packed patcher shell32.dll upatre
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
ManusCrypt, Nitol, SmokeLoader, Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Changes security center settings (notifications, updates, antivirus, firewall)
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Creates HTML files with .exe extension (expired dropper behavior)
Creates processes via WMI
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender real time protection (registry)
DLL reload attack detected
Drops PE files to the document folder of the user
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
May check the online IP address of the machine
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Performs DNS queries to domains with low reputation
Query firmware table information (likely to detect VMs)
Renames NTDLL to bypass HIPS
Sets debug register (to hijack the execution of another thread)
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Writes to foreign memory regions
Yara detected Generic Downloader
Yara detected ManusCrypt
Yara detected Nitol
Yara detected SmokeLoader
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 834721 Sample: E461562A06F4C2CEA8CC91D9FC6... Startdate: 25/03/2023 Architecture: WINDOWS Score: 100 153 Snort IDS alert for network traffic 2->153 155 Multi AV Scanner detection for domain / URL 2->155 157 Malicious sample detected (through community Yara rule) 2->157 159 18 other signatures 2->159 12 E461562A06F4C2CEA8CC91D9FC6FD75F393B79030D646.exe 10 2->12         started        15 rundll32.exe 2->15         started        17 svchost.exe 2->17         started        20 8 other processes 2->20 process3 file4 107 C:\Users\user\AppData\...\setup_installer.exe, PE32 12->107 dropped 22 setup_installer.exe 15 12->22         started        26 rundll32.exe 15->26         started        149 Query firmware table information (likely to detect VMs) 17->149 151 Changes security center settings (notifications, updates, antivirus, firewall) 20->151 signatures5 process6 file7 81 C:\Users\user\AppData\...\setup_install.exe, PE32 22->81 dropped 83 C:\Users\user\AppData\Local\...\sahiba_7.txt, PE32+ 22->83 dropped 85 C:\Users\user\AppData\Local\...\sahiba_6.txt, PE32 22->85 dropped 87 10 other files (9 malicious) 22->87 dropped 161 Multi AV Scanner detection for dropped file 22->161 28 setup_install.exe 1 22->28         started        163 Writes to foreign memory regions 26->163 165 Allocates memory in foreign processes 26->165 167 Creates a thread in another existing process (thread injection) 26->167 33 svchost.exe 26->33 injected 35 svchost.exe 26->35 injected 37 svchost.exe 26->37 injected 39 11 other processes 26->39 signatures8 process9 dnsIp10 137 razino.xyz 28->137 139 127.0.0.1 unknown unknown 28->139 109 C:\Users\user\AppData\...\sahiba_7.exe (copy), PE32+ 28->109 dropped 111 C:\Users\user\AppData\...\sahiba_6.exe (copy), PE32 28->111 dropped 113 C:\Users\user\AppData\...\sahiba_5.exe (copy), PE32 28->113 dropped 115 4 other malicious files 28->115 dropped 199 Multi AV Scanner detection for dropped file 28->199 201 Detected unpacking (changes PE section rights) 28->201 203 Performs DNS queries to domains with low reputation 28->203 41 cmd.exe 1 28->41         started        43 cmd.exe 1 28->43         started        45 cmd.exe 1 28->45         started        51 6 other processes 28->51 205 System process connects to network (likely due to code injection or exploit) 33->205 207 Sets debug register (to hijack the execution of another thread) 33->207 209 Modifies the context of a thread in another process (thread injection) 33->209 47 svchost.exe 33->47         started        141 34.104.35.123 GOOGLEUS United States 35->141 file11 signatures12 process13 dnsIp14 53 sahiba_6.exe 41->53         started        58 sahiba_2.exe 1 43->58         started        60 sahiba_3.exe 48 45->60         started        143 google.vrthcobj.com 185.116.193.219 HOSTER-KZ Kazakhstan 47->143 147 Query firmware table information (likely to detect VMs) 47->147 145 52.182.143.212 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 51->145 62 sahiba_1.exe 2 51->62         started        64 sahiba_7.exe 51->64         started        66 sahiba_4.exe 51->66         started        68 sahiba_5.exe 51->68         started        signatures15 process16 dnsIp17 117 212.193.30.115 SPD-NETTR Russian Federation 53->117 119 91.215.85.15 PINDC-ASRU Russian Federation 53->119 125 17 other IPs or domains 53->125 89 C:\Users\...\xO3QIJynB4EEGFiDrTiadnHT.exe, PE32 53->89 dropped 91 C:\Users\...\veEBvzOUarDWdxDrUHN08INa.exe, PE32 53->91 dropped 93 C:\Users\...\tR1Xsob2jeIxKTBLI0a_OFpP.exe, PE32 53->93 dropped 97 18 other malicious files 53->97 dropped 169 Drops PE files to the document folder of the user 53->169 171 May check the online IP address of the machine 53->171 173 Creates HTML files with .exe extension (expired dropper behavior) 53->173 175 Disable Windows Defender real time protection (registry) 53->175 95 C:\Users\user\AppData\Local\Temp\CC4F.tmp, PE32 58->95 dropped 177 DLL reload attack detected 58->177 179 Detected unpacking (changes PE section rights) 58->179 181 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 58->181 191 4 other signatures 58->191 70 explorer.exe 58->70 injected 127 3 other IPs or domains 60->127 183 Detected unpacking (overwrites its own PE header) 60->183 185 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 60->185 187 Tries to harvest and steal browser information (history, passwords, etc) 60->187 189 Creates processes via WMI 62->189 75 sahiba_1.exe 62->75         started        121 s.lletlee.com 64->121 129 2 other IPs or domains 66->129 123 148.251.234.83 HETZNER-ASDE Germany 68->123 file18 signatures19 process20 dnsIp21 131 188.114.97.7 CLOUDFLARENETUS European Union 70->131 133 199.59.243.223 BODIS-NJUS United States 70->133 135 70.32.1.32 ASN-GIGENETUS United States 70->135 99 C:\Users\user\AppData\Roaming\tuuwhhh, PE32 70->99 dropped 193 System process connects to network (likely due to code injection or exploit) 70->193 195 Benign windows process drops PE files 70->195 197 Hides that the sample has been downloaded from the Internet (zone.identifier) 70->197 101 C:\Users\user\AppData\Local\Temp\axhub.dll, PE32 75->101 dropped 103 C:\...\api-ms-win-core-string-l1-1-0.dll, PE32 75->103 dropped 105 C:\...\api-ms-win-core-namedpipe-l1-1-0.dll, PE32 75->105 dropped 77 conhost.exe 75->77         started        file22 signatures23 process24 process25 79 Conhost.exe 77->79         started       
Threat name:
Win32.Trojan.Jaik
Status:
Malicious
First seen:
2021-07-20 21:37:23 UTC
File Type:
PE (Exe)
Extracted files:
101
AV detection:
27 of 37 (72.97%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:nullmixer family:privateloader family:smokeloader family:vidar botnet:933 botnet:pub5 aspackv2 backdoor dropper evasion loader stealer trojan
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Modifies data under HKEY_USERS
Modifies registry class
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
ASPack v2.12-2.42
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Unexpected DNS network traffic destination
Vidar Stealer
Modifies Windows Defender Real-time Protection settings
NullMixer
PrivateLoader
Process spawned unexpected child process
SmokeLoader
Suspicious use of NtCreateUserProcessOtherParentProcess
Vidar
Malware Config
C2 Extraction:
http://razino.xyz/
http://conceitosseg.com/upload/
http://integrasidata.com/upload/
http://ozentekstil.com/upload/
http://finbelportal.com/upload/
http://telanganadigital.com/upload/
https://shpak125.tumblr.com/
Unpacked files
SH256 hash:
68ca42d0f61ab8eb65b27dcd8ed3ef2a46b53da2e5c1a5373cdc59b801dc7bca
MD5 hash:
be5801fddcd920fa741e011327ccc51a
SHA1 hash:
abb74bce4f7b09d5a79878549443586ae26444da
SH256 hash:
278b17331e86546245f56c8516e73ee4bfa415d9fbfa7e3cdd6954dfa163d66a
MD5 hash:
0e07fa6e85f4d68f832662d3dec6e2f0
SHA1 hash:
5dd39abb713e745e21f8d09f6c778b9d10be6ff0
SH256 hash:
9df557176017af72e0afc7d038aeda1c57dbcd75a2aa7cd0dcba428a6a229cc4
MD5 hash:
2047e6ff97f487f01907a93c3f178d0d
SHA1 hash:
074695c25ac029300b592b3b0e16eccac5238b05
SH256 hash:
396adb904ebd81c2996a01520af921ef4bffedaf45b65d50d158e95a10c2b943
MD5 hash:
3338af5387be57396e2ab03cdd18271f
SHA1 hash:
e60e505a56fedd2f91e0ac4ec7267c270b86ebc3
SH256 hash:
8d063d3aef4de69722e7dd08b9bda5fdf20da6d80a157d3f07fa0c3d5407e49d
MD5 hash:
559948db5816ae7ab26eb2eb533887ed
SHA1 hash:
e60442c6fb35239d298b01b0f4558264c01b2e7f
SH256 hash:
8206b4b3897ca45b9e083273f616902966e57091516844906e6ae2aefe63cef1
MD5 hash:
1c7be730bdc4833afb7117d48c3fd513
SHA1 hash:
dc7e38cfe2ae4a117922306aead5a7544af646b8
SH256 hash:
68cd2e8978b3acc40155fe02d7dee1a8e1296ee535451b9c142a66edd55c83c9
MD5 hash:
c2aa5c1c1f766b89905a38e41259c903
SHA1 hash:
d0f4659cbc09e499044cec4dcecff776fe672c80
SH256 hash:
d90a03e850735fa12f2209a57191524ffc9c2f321a65ee7f3b51e083eb59b80f
MD5 hash:
f5ba66ed9cc96376d02e02bbfc59f460
SHA1 hash:
9d6393ea4739724156dd0cfacc5cb8db2e52f32c
SH256 hash:
e076308cd330a228911893aadb3fb3649ffc22d91de1264db438aaba0f8ad3e3
MD5 hash:
dfb8509930e934eab10d786b60aed7b4
SHA1 hash:
57bf53e58fc82e8b04aa25a9f2601ad8bf62937d
SH256 hash:
4d4ad145431ee356221914f2908ff9b4a4a56f90b9409ec752f7be1a978e7435
MD5 hash:
ae7c477ce9bd98d13ccff5fc4a0d190e
SHA1 hash:
249ff902f66c3d0cee6656802b14a9c34807bc8f
SH256 hash:
8ed9f410b41e51f09304e5cdadc4d61f82562c9ee15be810e063f2f568812dd0
MD5 hash:
0c3f670f496ffcf516fe77d2a161a6ee
SHA1 hash:
0c59d3494b38d768fe120e0a4ca2a1dca7567e6e
Detections:
PrivateLoader win_privateloader_w0 win_privateloader_auto win_privateloader_a0
SH256 hash:
e1cc6a9d780602fe6e789bf5c3a27e87e197a4e3bf7c8138ea2f9dfec70fb963
MD5 hash:
f707252b9c9579677fffb013e0cfc646
SHA1 hash:
8ab483023fa8773afb8c13464c39c5b8e687f126
SH256 hash:
8fa9aa638116a1b533677d68361a5730190460c28447322902ba389a116cd1a2
MD5 hash:
cefdba1f2eae70621a7b194a3519b19a
SHA1 hash:
107bb0aa51e2a1ec04891ba6ef690c83c65374df
SH256 hash:
e461562a06f4c2cea8cc91d9fc6fd75f393b79030d6463169f71b0ff2f6b7ded
MD5 hash:
0b682a6f8bd47a562e84e3359400a89d
SHA1 hash:
07ef2f949e1cdbba996ded863cb21580292987fc
Malware family:
RedLine.E
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:command_and_control
Author:CD_R0M_
Description:This rule searches for common strings found by malware using C2. Based on a sample used by a Ransomware group
Rule name:INDICATOR_EXE_Packed_ASPack
Author:ditekSHen
Description:Detects executables packed with ASPack
Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation
Author:ditekSHen
Description:Detects executables containing potential Windows Defender anti-emulation checks
Rule name:MALWARE_Win_Chebka
Author:ditekSHen
Description:Detects Chebka
Rule name:MALWARE_Win_DLInjector03
Author:ditekSHen
Description:Detects unknown loader / injector
Rule name:MALWARE_Win_Vidar
Author:ditekSHen
Description:Detects Vidar / ArkeiStealer
Rule name:meth_stackstrings
Author:Willi Ballenthin
Rule name:RedOctoberPluginCollectInfo
Rule name:SUSP_XORed_MSDOS_Stub_Message
Author:Florian Roth (Nextron Systems)
Description:Detects suspicious XORed MSDOS stub message
Reference:https://yara.readthedocs.io/en/latest/writingrules.html#xor-strings
Rule name:Windows_Trojan_Generic_a681f24a
Author:Elastic Security
Rule name:Windows_Trojan_Smokeloader_3687686f
Author:Elastic Security
Rule name:Windows_Trojan_Vidar_114258d5
Author:Elastic Security
Rule name:Windows_Trojan_Vidar_9007feb2
Author:Elastic Security
Rule name:win_vidar_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.vidar.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments