Behavioral task
behavioral1
Sample
3e5ccb6dcbb35257f07ca1e59bde0fde.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3e5ccb6dcbb35257f07ca1e59bde0fde.exe
Resource
win10v2004-20231215-en
General
-
Target
3e5ccb6dcbb35257f07ca1e59bde0fde
-
Size
1.5MB
-
MD5
3e5ccb6dcbb35257f07ca1e59bde0fde
-
SHA1
39ecf0317a54a69a4454282984b1916787cf6154
-
SHA256
4101bd379660a169d50442c9921d6fb0329620efbc5a163856c2f5e5f41e601c
-
SHA512
0486d713d89e64e21a484a619fc4e2ecb8c36d700e7eac741d84e50e8be8b0e72e43eefacde15d09cace7107b7314caebea679b8fb5058ab63a8b1e707623e8e
-
SSDEEP
24576:ifwDi9seUAsBeZYyYoMGYVl2Jjj/O3O3al5e6Lz4/9j3tC2lyUJaRyP:Zi9shedMfQGWal5ngFjdC2lcQP
Malware Config
Extracted
privateloader
http://37.0.10.214/proxies.txt
http://37.0.10.244/server.txt
http://wfsdragon.ru/api/setStats.php
37.0.10.237
Signatures
-
Privateloader family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3e5ccb6dcbb35257f07ca1e59bde0fde
Files
-
3e5ccb6dcbb35257f07ca1e59bde0fde.exe windows:6 windows x86 arch:x86
9589ad8837113b4b31a6a8a07cbda1f9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetPriorityClass
GetCurrentProcess
lstrcatA
GetModuleHandleA
SetCurrentDirectoryA
GetModuleHandleExA
DeleteFileA
lstrcpyA
GetProcAddress
GetLastError
HeapFree
lstrlenA
HeapAlloc
lstrcpynA
GetProcessHeap
WriteConsoleW
QueryPerformanceCounter
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
CloseHandle
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetEvent
ResetEvent
WaitForSingleObjectEx
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
TerminateProcess
RaiseException
RtlUnwind
FreeLibrary
LoadLibraryExW
EncodePointer
ReadFile
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
GetStdHandle
WriteFile
SetFilePointerEx
GetConsoleMode
ReadConsoleW
GetFileType
LCMapStringW
GetConsoleOutputCP
GetFileSizeEx
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
GetStringTypeW
CreateFileW
FlushFileBuffers
HeapSize
HeapReAlloc
SetEndOfFile
DecodePointer
Sections
.text Size: 109KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ