Behavioral task
behavioral1
Sample
3060-54-0x0000000001330000-0x00000000019FB000-memory.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
3060-54-0x0000000001330000-0x00000000019FB000-memory.exe
Resource
win10v2004-20230703-en
General
-
Target
3060-54-0x0000000001330000-0x00000000019FB000-memory.dmp
-
Size
6.8MB
-
MD5
5bd3a596a96f968cb26b945929dde90c
-
SHA1
b3826db6b978ab4f7a69bd18a745dd9753183c68
-
SHA256
02a529b4d4d7aa5786dd5be4eaf3c32966b1f07aee0e4d801e438624b7e1edbd
-
SHA512
f112fa78f72f0ee354da8bd9550ce2fd5c2e78d86b59675dcdf67bb03e8e6e1f107cc9c2df8a6f5a3746adbd3f231feac2c0f847867ccfeeac9c985dda120e64
-
SSDEEP
196608:NDEjf7B1eCi9burg9LDGHkrXhavUo8+ziI1u/0Fj6g2:NDETnybzyHkrsMo8+Lwqx
Malware Config
Extracted
privateloader
1.1.1.1
Signatures
-
Privateloader family
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3060-54-0x0000000001330000-0x00000000019FB000-memory.dmp
Files
-
3060-54-0x0000000001330000-0x00000000019FB000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: - Virtual size: 861KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 176KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 1.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 3.7MB - Virtual size: 3.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 224KB - Virtual size: 548KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ