MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ebc2784e2648e4ff72f48a6251ff28eee69003c8bd4ab604f5b43553a4140f4b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



PrivateLoader


Vendor detections: 14


Intelligence 14 IOCs YARA 3 File information Comments

SHA256 hash: ebc2784e2648e4ff72f48a6251ff28eee69003c8bd4ab604f5b43553a4140f4b
SHA3-384 hash: 1947261b93d0ba002265e59f40c1b3cb920c7ba3e92dee0b413d45dc8142e66704dcae7093c7f6958c87e81cfc057877
SHA1 hash: baa0dc4ed3e9d63384961ad9a1e7b43e8681a3c5
MD5 hash: ece476206e52016ed4e0553d05b05160
humanhash: jig-apart-wisconsin-stairway
File name:File.bin
Download: download sample
Signature PrivateLoader
File size:436'224 bytes
First seen:2022-07-18 18:35:05 UTC
Last seen:2022-07-18 19:51:22 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash fcfbb183dda4a3825a0923650518721c (1 x PrivateLoader, 1 x CoinMiner)
ssdeep 12288:nTD0nFWEutqchgPoxntMRWru3Yo6T9XP+b9:n/0igPoxntMQru3YLRWb9
TLSH T13F946B01F2C088B2EC664435486BD972A57BFC350570CA2F2359B66E6F773D2682BF16
TrID 40.3% (.EXE) Win64 Executable (generic) (10523/12/4)
19.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
17.2% (.EXE) Win32 Executable (generic) (4505/5/1)
7.7% (.EXE) OS/2 Executable (generic) (2029/13)
7.6% (.EXE) Generic Win/DOS Executable (2002/3)
File icon (PE):PE icon
dhash icon 74ecccd8d0d4dcd4 (1 x RedLineStealer, 1 x PrivateLoader, 1 x CoinMiner)
Reporter KdssSupport
Tags:exe PrivateLoader


Avatar
KdssSupport
Uploaded with API

Intelligence


File Origin
# of uploads :
2
# of downloads :
291
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
installer.exe
Verdict:
Malicious activity
Analysis date:
2022-06-04 03:06:42 UTC
Tags:
redline evasion trojan socelars stealer loader rat ransomware stop

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Reading critical registry keys
Query of malicious DNS domain
Blocking the Windows Defender launch
Sending an HTTP GET request to an infection source
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
EvasionQueryPerformanceCounter
CheckCmdLine
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
RedLine, Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Connects to a pastebin service (likely for C&C)
Connects to many ports of the same IP (likely port scanning)
Contains functionality to inject threads in other processes
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender real time protection (registry)
Downloads files with wrong headers with respect to MIME Content-Type
Found C&C like URL pattern
Found stalling execution ending in API Sleep call
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses known network protocols on non-standard ports
Yara detected RedLine Stealer
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 668528 Sample: File.bin Startdate: 18/07/2022 Architecture: WINDOWS Score: 100 36 yandex.ru 2->36 38 v.xyzgamev.com 2->38 40 10 other IPs or domains 2->40 48 Snort IDS alert for network traffic 2->48 50 Multi AV Scanner detection for domain / URL 2->50 52 Malicious sample detected (through community Yara rule) 2->52 54 20 other signatures 2->54 8 File.exe 4 54 2->8         started        signatures3 process4 dnsIp5 42 standwithfrien.com 8->42 44 212.192.242.47, 49785, 49795, 49820 RAPMSB-ASRU Russian Federation 8->44 46 20 other IPs or domains 8->46 24 C:\Users\...\uY_00TYGJoONCsf3xwxR9D5q.exe, PE32 8->24 dropped 26 C:\Users\...\kaD0ZovAghfT5GjUnqmKHJGl.exe, PE32 8->26 dropped 28 C:\Users\...\Zq0u3pjVumsr8fl0nFf8q4w8.exe, PE32 8->28 dropped 30 22 other files (18 malicious) 8->30 dropped 56 May check the online IP address of the machine 8->56 58 Creates HTML files with .exe extension (expired dropper behavior) 8->58 60 Tries to steal Mail credentials (via file / registry access) 8->60 62 3 other signatures 8->62 13 YaThXsNqwPnP3iWK6l6uf2qi.exe 1 8->13         started        16 TDfM4pQ1gKHcqFWGnkgTD48j.exe 3 8->16         started        18 adUNuG6FWIoOTIMXPvx7E5Oc.exe 8->18         started        20 10 other processes 8->20 file6 signatures7 process8 file9 32 C:\Users\...\pidHTSIGEi8DrAmaYu9K8ghN89.dll, PE32+ 13->32 dropped 34 C:\Users\user\AppData\Local\...\SETUP_~2.EXE, PE32 16->34 dropped 22 MSBuild.exe 18->22         started        process10
Threat name:
Win32.Adware.Amonetize
Status:
Malicious
First seen:
2021-09-23 19:00:30 UTC
File Type:
PE (Exe)
Extracted files:
4
AV detection:
21 of 25 (84.00%)
Threat level:
  1/5
Result
Malware family:
Score:
  10/10
Tags:
family:privateloader family:redline family:tofsee family:vidar botnet:1120 botnet:1491 evasion infostealer loader main spyware stealer suricata trojan upx
Behaviour
Checks SCSI registry key(s)
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks computer location settings
Loads dropped DLL
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
UPX packed file
Vidar Stealer
Modifies Windows Defender Real-time Protection settings
PrivateLoader
RedLine
RedLine payload
Tofsee
Vidar
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Win32/Spy.Socelars.S CnC Activity M3
Malware Config
C2 Extraction:
http://45.133.1.182/proxies.txt
http://45.133.1.107/server.txt
pastebin.com/raw/A7dSG1te
http://wfsdragon.ru/api/setStats.php
51.178.186.149
http://91.241.19.125/pub.php?pub=one
http://sarfoods.com/index.php
https://t.me/tgch_hijuly
https://c.im/@olegf9844h
svartalfheim.top
jotunheim.name
Unpacked files
SH256 hash:
ebc2784e2648e4ff72f48a6251ff28eee69003c8bd4ab604f5b43553a4140f4b
MD5 hash:
ece476206e52016ed4e0553d05b05160
SHA1 hash:
baa0dc4ed3e9d63384961ad9a1e7b43e8681a3c5
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB
Rule name:privateloader
Author:andre@tavares.re
Description:PrivateLoader pay-per-install malware

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

PrivateLoader

Executable exe ebc2784e2648e4ff72f48a6251ff28eee69003c8bd4ab604f5b43553a4140f4b

(this sample)

  
Delivery method
Distributed via web download

Comments