Behavioral task
behavioral1
Sample
86890F5D0DC15D61B23CEF3A33334A22FD11A729D8831.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
86890F5D0DC15D61B23CEF3A33334A22FD11A729D8831.exe
Resource
win10v2004-20220812-en
General
-
Target
86890F5D0DC15D61B23CEF3A33334A22FD11A729D8831.exe
-
Size
351KB
-
MD5
7ab8ca022f7433bd259065b606d8ab57
-
SHA1
b02b628d926cb878f58c3a3e36e93b2d818f567d
-
SHA256
86890f5d0dc15d61b23cef3a33334a22fd11a729d8831f3eb9d8b54ffb48fa98
-
SHA512
8c21d9fee83363f3eb7d3b8fe5e8bd039d8c0a26b5fb5dbd9eb85134fdefd5455e11e425121dbc9ef6cfb83456a930a15ef45eee49837696561dd695f424f2b1
-
SSDEEP
6144:ORyZ8br4ueE+pGl9i81SV2K2d6Or989IwfvyvbAxXUt:QyZIeglS5yc
Malware Config
Extracted
privateloader
http://163.123.143.4/proxies.txt
http://193.233.177.215/server.txt
pastebin.com/raw/A7dSG1te
http://wfsdragon.ru/api/setStats.php
163.123.143.12
Signatures
-
Privateloader family
Files
-
86890F5D0DC15D61B23CEF3A33334A22FD11A729D8831.exe.exe windows x86
3c86c2b83b33b86ba24b34af43867478
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcess
VirtualAlloc
lstrcatA
GetModuleHandleA
SetCurrentDirectoryA
Sleep
LoadLibraryA
DeleteFileA
lstrcpyA
CreateThread
GetProcAddress
GetFileSize
GetConsoleWindow
GetLastError
GetModuleHandleW
HeapFree
lstrlenA
LoadLibraryW
GetProcessHeap
WriteConsoleW
CloseHandle
CreateFileW
SetFilePointerEx
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
HeapReAlloc
HeapSize
GetStringTypeW
SetStdHandle
GetFileType
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
HeapAlloc
GetTimeZoneInformation
LCMapStringW
CompareStringW
WriteFile
GetStdHandle
GetModuleFileNameW
GetModuleHandleExW
ExitProcess
EncodePointer
LoadLibraryExW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
RaiseException
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
RtlUnwind
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
DecodePointer
user32
ShowWindow
api-ms-win-core-profile-l1-1-0
QueryPerformanceCounter
api-ms-win-core-sysinfo-l1-1-0
GetSystemTimeAsFileTime
Sections
.text Size: 102KB - Virtual size: 101KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 211KB - Virtual size: 210KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ