MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e5447818976ad7af2ae55ccee4baab64d2a76ce8bcd43654ca8361dc19c91ad4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Fabookie


Vendor detections: 16


Intelligence 16 IOCs YARA 22 File information Comments

SHA256 hash: e5447818976ad7af2ae55ccee4baab64d2a76ce8bcd43654ca8361dc19c91ad4
SHA3-384 hash: 6b352a996d4bf62f48c0003fec1c34f52cd7d59ef1a2bd7e54d206edae63ad746c284518cebfd451b43842a3a9729087
SHA1 hash: 06bf4f4ef8a8dc8a4f4709b4930e0ba6f4135d95
MD5 hash: 1edf07465aaf19e98f0ef5e2ab941a15
humanhash: fillet-social-xray-vegan
File name:Install.exe
Download: download sample
Signature Fabookie
File size:5'170'688 bytes
First seen:2023-05-24 08:10:39 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 71dac11c80b80d1f1b6b3c60718d874a (2 x RedLineStealer, 2 x PrivateLoader, 1 x Amadey)
ssdeep 98304:nKQaiDYIdurk2Z9eEX0axt29NcyvJayjbsLhsd0bnOy:KQaKYIdurk2eEz32fcGoebcfbnOy
TLSH T16F36232439DF6918F479B6BA1FC5C3BED69DF6D9E10B4A7B6280130B9B842413E07871
TrID 52.9% (.EXE) Win32 Executable (generic) (4505/5/1)
23.5% (.EXE) Generic Win/DOS Executable (2002/3)
23.5% (.EXE) DOS Executable Generic (2000/1)
File icon (PE):PE icon
dhash icon 70c080b0b082c070 (1 x Fabookie)
Reporter abuse_ch
Tags:exe Fabookie


Avatar
abuse_ch
Fabookie C2:
83.97.73.122:19062

Intelligence


File Origin
# of uploads :
1
# of downloads :
257
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
Install.exe
Verdict:
Malicious activity
Analysis date:
2023-05-24 08:13:01 UTC
Tags:
privateloader opendir loader evasion rat redline gcleaner smoke trojan amadey

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the Windows subdirectories
Сreating synchronization primitives
Modifying a system file
Replacing files
DNS request
Launching a service
Launching a process
Sending a custom TCP request
Sending an HTTP GET request
Reading critical registry keys
Creating a file
Sending a UDP request
Forced system process termination
Searching for synchronization primitives
Creating a process from a recently created file
Creating a process with a hidden window
Creating a file in the %temp% subdirectories
Creating a window
Blocking the Windows Defender launch
Query of malicious DNS domain
Adding exclusions to Windows Defender
Sending an HTTP GET request to an infection source
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
lolbin packed packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
Fabookie, Nymaim, PrivateLoader, RedLine
Detection:
malicious
Classification:
rans.troj.spyw.evad
Score:
100 / 100
Signature
.NET source code references suspicious native API functions
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disables Windows Defender (deletes autostart)
Drops PE files to the document folder of the user
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies Group Policy settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses schtasks.exe or at.exe to add and modify task schedules
Writes many files with high entropy
Writes to foreign memory regions
Yara detected Fabookie
Yara detected Nymaim
Yara detected PrivateLoader
Yara detected RedLine Stealer
Yara detected SmokeLoader
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 874419 Sample: Install.exe Startdate: 24/05/2023 Architecture: WINDOWS Score: 100 196 Malicious sample detected (through community Yara rule) 2->196 198 Antivirus detection for URL or domain 2->198 200 Antivirus detection for dropped file 2->200 202 18 other signatures 2->202 10 Install.exe 10 39 2->10         started        15 PowerControl_Svc.exe 2->15         started        17 PowerControl_Svc.exe 2->17         started        19 4 other processes 2->19 process3 dnsIp4 186 188.114.96.7 CLOUDFLARENETUS European Union 10->186 188 87.240.132.72 VKONTAKTE-SPB-AShttpvkcomRU Russian Federation 10->188 192 13 other IPs or domains 10->192 128 C:\Users\...\smJkwTWwhroLLd7SwzOKjfoX.exe, PE32 10->128 dropped 130 C:\Users\...\rHg2DO5PF9bXlpSBCCGN7bWS.exe, PE32+ 10->130 dropped 132 C:\Users\...\jpxKi7rX3ZNxz94S3ZS6Kw3k.exe, PE32 10->132 dropped 140 13 other malicious files 10->140 dropped 260 Detected unpacking (changes PE section rights) 10->260 262 Creates HTML files with .exe extension (expired dropper behavior) 10->262 264 Disables Windows Defender (deletes autostart) 10->264 272 4 other signatures 10->272 21 jlWkE5JaEc4K5WO1OY4DWAJp.exe 10->21         started        25 jpxKi7rX3ZNxz94S3ZS6Kw3k.exe 17 10->25         started        27 Ox6t8JpEx7Nx6aYUnc0pm5J9.exe 10->27         started        34 5 other processes 10->34 134 C:\Users\...\1zwjBZenmYVq85dgwvCohYNn.exe, MS-DOS 15->134 dropped 136 C:\Users\user\AppData\Local\...\WWW14[2].bmp, MS-DOS 15->136 dropped 30 1zwjBZenmYVq85dgwvCohYNn.exe 15->30         started        138 C:\Users\user\AppData\Local\...\WWW14[1].bmp, MS-DOS 17->138 dropped 32 1zwjBZenmYVq85dgwvCohYNn.exe 17->32         started        190 51.124.78.146 MICROSOFT-CORP-MSN-AS-BLOCKUS United Kingdom 19->190 266 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 19->266 268 Query firmware table information (likely to detect VMs) 19->268 270 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 19->270 file5 signatures6 process7 dnsIp8 166 149.154.167.99 TELEGRAMRU United Kingdom 21->166 118 3 other malicious files 21->118 dropped 36 oe2ABHvLI91IUDvjOHc_qGBS.exe 21->36         started        55 2 other processes 21->55 168 192.168.2.1 unknown unknown 25->168 120 2 other malicious files 25->120 dropped 41 oe2ABHvLI91IUDvjOHc_qGBS.exe 25->41         started        43 schtasks.exe 25->43         started        234 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 27->234 236 Maps a DLL or memory area into another process 27->236 254 2 other signatures 27->254 45 explorer.exe 27->45 injected 170 87.240.132.78 VKONTAKTE-SPB-AShttpvkcomRU Russian Federation 30->170 110 C:\Users\...\uif4AFFh3UYRRg1p1ZR13128.exe, PE32 30->110 dropped 112 C:\Users\...\jgcHkE_a21yVmnniz4U8MSQ8.exe, PE32+ 30->112 dropped 122 8 other malicious files 30->122 dropped 238 Multi AV Scanner detection for dropped file 30->238 240 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 30->240 242 Query firmware table information (likely to detect VMs) 30->242 256 7 other signatures 30->256 172 94.142.138.131 IHOR-ASRU Russian Federation 32->172 114 C:\Users\...\reJCl7OPAhXPfFI8pI19eME8.exe, PE32 32->114 dropped 116 C:\Users\...\eMSGU3R97XgOrvJFwbMnYUn3.exe, PE32 32->116 dropped 124 5 other malicious files 32->124 dropped 244 Tries to harvest and steal browser information (history, passwords, etc) 32->244 258 2 other signatures 32->258 174 185.81.68.115 KLNOPT-ASFI Finland 34->174 176 103.100.211.218 HKKFGL-AS-APHKKwaifongGroupLimitedHK Hong Kong 34->176 178 4 other IPs or domains 34->178 126 3 other malicious files 34->126 dropped 246 Writes to foreign memory regions 34->246 248 Allocates memory in foreign processes 34->248 250 Tries to steal Crypto Currency Wallets 34->250 252 Injects a PE file into a foreign processes 34->252 47 v4596723.exe 34->47         started        49 is-SOH67.tmp 34->49         started        51 AppLaunch.exe 34->51         started        53 conhost.exe 34->53         started        file9 signatures10 process11 dnsIp12 152 85.217.144.228 WS171-ASRU Bulgaria 36->152 162 6 other IPs or domains 36->162 92 C:\Users\...\iWIDzmldPOZGzNI6W6rUdUTW.exe, PE32 36->92 dropped 100 13 other malicious files 36->100 dropped 204 Multi AV Scanner detection for dropped file 36->204 206 Detected unpacking (changes PE section rights) 36->206 208 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 36->208 228 6 other signatures 36->228 57 dhsAUTo2EnbbPk_WTe1mHzWb.exe 36->57         started        60 7kQ2PIVljBvtfv_30PBh01WY.exe 36->60         started        154 149.154.158.34 HVC-ASUS European Union 41->154 94 C:\Users\...\wmvQWhX96V2qkCd2LGW3ce_T.exe, PE32 41->94 dropped 96 C:\Users\...\sM51YdKGs3AR_CUzqaOyDBRQ.exe, PE32 41->96 dropped 98 C:\Users\...\mdk9jmQ8fbtrbBf6TBmxWaZs.exe, PE32+ 41->98 dropped 102 11 other malicious files 41->102 dropped 210 Query firmware table information (likely to detect VMs) 41->210 212 Disables Windows Defender (deletes autostart) 41->212 214 Disable Windows Defender real time protection (registry) 41->214 63 conhost.exe 43->63         started        156 103.233.24.19 WEBWERKS-AS-INWebWerksIndiaPvtLtdIN India 45->156 158 175.126.109.15 SKB-ASSKBroadbandCoLtdKR Korea Republic of 45->158 164 4 other IPs or domains 45->164 104 11 other malicious files 45->104 dropped 216 System process connects to network (likely due to code injection or exploit) 45->216 218 Benign windows process drops PE files 45->218 220 Hides that the sample has been downloaded from the Internet (zone.identifier) 45->220 65 rundll32.exe 45->65         started        76 3 other processes 45->76 106 2 other malicious files 47->106 dropped 67 v0954574.exe 47->67         started        108 8 other files (7 malicious) 49->108 dropped 69 Rec524.exe 49->69         started        160 157.254.164.98 BEANFIELDCA United States 51->160 222 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 51->222 224 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 51->224 226 Tries to steal Crypto Currency Wallets 51->226 72 conhost.exe 55->72         started        74 conhost.exe 55->74         started        file13 signatures14 process15 dnsIp16 230 Writes to foreign memory regions 57->230 232 Injects a PE file into a foreign processes 57->232 142 C:\Users\user\AppData\Local\...\is-VDAA3.tmp, PE32 60->142 dropped 144 C:\Users\user\AppData\Local\...\b6192697.exe, PE32 67->144 dropped 146 C:\Users\user\AppData\Local\...\a5800051.exe, PE32 67->146 dropped 78 b6192697.exe 67->78         started        82 a5800051.exe 67->82         started        180 45.12.253.56 CMCSUS Germany 69->180 182 45.12.253.72 CMCSUS Germany 69->182 184 45.12.253.75 CMCSUS Germany 69->184 148 C:\Users\user\AppData\Roaming\...\nuhpZZ6.exe, PE32 69->148 dropped 150 C:\Users\user\...\fuckingdllENCR[1].dll, data 69->150 dropped 84 nuhpZZ6.exe 69->84         started        86 cmd.exe 69->86         started        file17 signatures18 process19 dnsIp20 194 83.97.73.122 UNACS-AS-BG8000BurgasBG Germany 78->194 274 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 78->274 276 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 78->276 278 Tries to harvest and steal browser information (history, passwords, etc) 78->278 280 Multi AV Scanner detection for dropped file 82->280 282 Disable Windows Defender notifications (registry) 82->282 88 conhost.exe 86->88         started        90 taskkill.exe 86->90         started        signatures21 process22
Threat name:
Win32.Trojan.PrivateLoader
Status:
Malicious
First seen:
2023-05-24 08:11:07 UTC
File Type:
PE (Exe)
Extracted files:
47
AV detection:
15 of 23 (65.22%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
privateloader
Score:
  10/10
Tags:
family:privateloader loader main spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Program crash
Drops file in System32 directory
Looks up external IP address via web service
Checks computer location settings
Reads user/profile data of web browsers
PrivateLoader
Malware Config
C2 Extraction:
http://91.241.19.125/pub.php?pub=one
http://sarfoods.com/index.php
45.15.156.229
85.208.136.10
94.131.106.196
5.181.80.133
94.142.138.131
94.142.138.113
208.67.104.60
Unpacked files
SH256 hash:
78b548e9e5977cc2679e558a299b669bca92769cd7a616aaad4eddfd7a66e29a
MD5 hash:
67e0b665154b90ce55e22b39edbdcfb0
SHA1 hash:
cd85b98b4000ffd0b627ac12190250192443acf9
Detections:
PrivateLoader win_privateloader_w0 win_privateloader_a0
SH256 hash:
e5447818976ad7af2ae55ccee4baab64d2a76ce8bcd43654ca8361dc19c91ad4
MD5 hash:
1edf07465aaf19e98f0ef5e2ab941a15
SHA1 hash:
06bf4f4ef8a8dc8a4f4709b4930e0ba6f4135d95
Malware family:
PrivateLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:INDICATOR_EXE_Packed_ConfuserEx
Author:ditekSHen
Description:Detects executables packed with ConfuserEx Mod
Rule name:INDICATOR_EXE_Packed_MPress
Author:ditekSHen
Description:Detects executables built or packed with MPress PE compressor
Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:malware_shellcode_hash
Author:JPCERT/CC Incident Response Group
Description:detect shellcode api hash value
Rule name:MALWARE_Win_DLInjector06
Author:ditekSHen
Description:Detects downloader / injector
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:MAL_Malware_Imphash_Mar23_1
Author:Arnim Rupp
Description:Detects malware by known bad imphash or rich_pe_header_hash
Reference:https://yaraify.abuse.ch/statistics/
Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:pe_imphash
Rule name:privateloader
Author:andretavare5
Description:PrivateLoader pay-per-install malware
Rule name:Privateloader_Main_Component
Description:Detects PrivateLoader Main Component
Rule name:redline_stealer_1
Author:Nikolaos 'n0t' Totosis
Description:RedLine Stealer Payload
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:TeslaCryptPackedMalware
Rule name:Win32_Trojan_RedLineStealer
Author:Netskope Threat Labs
Description:Identifies RedLine Stealer samples
Reference:deb95cae4ba26dfba536402318154405
Rule name:Windows_Trojan_PrivateLoader_96ac2734
Author:Elastic Security
Rule name:Windows_Trojan_Smokeloader_3687686f
Author:Elastic Security
Rule name:win_gcleaner_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.gcleaner.
Rule name:win_privateloader
Author:andretavare5
Reference:https://tavares.re/blog/2022/06/06/hunting-privateloader-pay-per-install-service
Rule name:win_privateloader_w0
Author:andretavare5
Reference:https://tavares.re/blog/2022/06/06/hunting-privateloader-pay-per-install-service

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments