General

  • Target

    78044ff8f74edccd5579136ba1d670ce4f382444735c3885ab0542dd2b77ce63

  • Size

    23.5MB

  • Sample

    240524-r47w3shf3y

  • MD5

    17ac92e17c913e676d60640ef3452e5e

  • SHA1

    0203d2369b2012ddce31399fcd0744820d7e805e

  • SHA256

    78044ff8f74edccd5579136ba1d670ce4f382444735c3885ab0542dd2b77ce63

  • SHA512

    fc35f5eae05b991da203e470711f5dc9454731a0c98c58664f4b3fc8aa0320585f62342057c7c0df30cb9657f841f9a1cd711fc70c48f29c97fcf8c2acf306fd

  • SSDEEP

    393216:4Fq/j8+GeIX0CRi6Pjf/KHuDQYMNdIPD8v37pzf9gt0RFcOGcwG4T67O7p1VRmf3:4IA0Ii6Pj68Kdu8vFzf9a2jGcwd67O7M

Malware Config

Extracted

Family

risepro

C2

194.49.94.152

193.233.132.51

5.42.92.51

Extracted

Family

redline

Botnet

horda

C2

194.49.94.152:19053

Extracted

Family

smokeloader

Version

2022

C2

http://194.49.94.210/fks/index.php

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

taiga

C2

5.42.92.51:19057

Targets

    • Target

      2ac9284d26694cef6e105c1d2811bfa8f9f4ad619164ac6068f85f79fdc93c2e

    • Size

      2.2MB

    • MD5

      8c8f488d4517e6e6a7b335b42cd116f3

    • SHA1

      5420752757751f38e1f1fec5fa09d31e5be4fd5e

    • SHA256

      2ac9284d26694cef6e105c1d2811bfa8f9f4ad619164ac6068f85f79fdc93c2e

    • SHA512

      ffaca884a9c07915fe45aebd3e36a377e77c488bc80f248744da91ebb143bc7a027cbf5e014445359a8ce34d1d4c577ee635ec5b9af6b6b0c47b1b98f33167d2

    • SSDEEP

      49152:2hl6EoYK8uZlFR3Y9Rhdb+Ios4kX1B/MPS5UVfWRxRk:EvoYaV3q36s4kXD55U1WRg

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • RisePro

      RisePro stealer is an infostealer distributed by PrivateLoader.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • Target

      46054179cb2d9b509f8a1029b4d1b357f32a91ab0af933d26deeaaae266db1c6

    • Size

      634KB

    • MD5

      5d66d2aba93fc12ea57807cdfde0f9bd

    • SHA1

      b3a4709c059137a8f99cfdca6d379435d5e74f73

    • SHA256

      46054179cb2d9b509f8a1029b4d1b357f32a91ab0af933d26deeaaae266db1c6

    • SHA512

      7eb64d383e338e028e7fc46b7705e02610fed7ae12d7a3b9a0eb63952a9ebc3aebed949b277bb10e1d94b5d3ffb482dbff16a926deb0a36defb012e3d7fbd4b9

    • SSDEEP

      12288:hMrXy90BkujYvPGmnqc3JQSo61S9WeQy1INqfJ+PVIRCOQ:SyMkujY7nV3Gkc9n1EqwVIJQ

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Executes dropped EXE

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Detected potential entity reuse from brand paypal.

    • Target

      4da066114fff05c7f108852d67f4151134d789b0b406c964771aa61acdaf28cb

    • Size

      1.1MB

    • MD5

      fe2064125b9df0ddb55feff8a7aa1d56

    • SHA1

      bce38bd767a42f8de5f35963bf5ba5fc1f17e96c

    • SHA256

      4da066114fff05c7f108852d67f4151134d789b0b406c964771aa61acdaf28cb

    • SHA512

      118b9643bc25032ae2b53239deb9b6c23cccbbf72fe07def7514f9d1da78db5afb06d50e7df002880e19ac3698e51914909c082c0898e5422603c25e04250026

    • SSDEEP

      24576:gyb3cYGvxdgfbR6mUOSop/PJIJ6Hw4SFfTV5uvhIN:nb3e3e0nAZJIJb4UfTV5

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • RisePro

      RisePro stealer is an infostealer distributed by PrivateLoader.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • Target

      52fd0a92cd193f49dd929ce5ff9680fad847ee599a1bcf1b3d85bf92a28149e8

    • Size

      803KB

    • MD5

      5aacc978e30e235a1dce9e840e39af43

    • SHA1

      7f4e4359b1bfe0e961e0f56748349e7305c098a7

    • SHA256

      52fd0a92cd193f49dd929ce5ff9680fad847ee599a1bcf1b3d85bf92a28149e8

    • SHA512

      a6bdd0a1207d27e0f4d1ea6a4f5f8d2f0f991c0793149f7ce89b1474a443c3d17ac178b4142544107df42750be24d9a20a214b241a67d026e2e4c15060728d09

    • SSDEEP

      12288:WMrsy90+EdYGF/dYrO/K3M2552xWH/XypBUBTq0wuZnB3GiNk7RaWI0cC79Yj11C:WylEbF6a/Km+/XypaxwuZnVFN6R0uhd

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • RisePro

      RisePro stealer is an infostealer distributed by PrivateLoader.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • Target

      64b627f8b2e8627a31f5ccb6fd6d30c39a1cd72c7bf4eb689910c2ce78d646dc

    • Size

      866KB

    • MD5

      25716913ffb50b6c693b063bc9d3f788

    • SHA1

      c79f978cfe9c6d905f718dd46457b0d7601985a7

    • SHA256

      64b627f8b2e8627a31f5ccb6fd6d30c39a1cd72c7bf4eb689910c2ce78d646dc

    • SHA512

      84de52ac4eb3817549ce390f6ed60508f07f02eb2391ca7f4743aab3c5a61947e6c1d41c7d36a99a124e2f767fb7b1bd4f40f4c75fc4f02460d444e262012e6a

    • SSDEEP

      24576:g0yWXtYjSDrBNRzGDFv1JkyKbo+2VV+OBOtDW:0WXtY+5NwDVDrK8+22O8p

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • RisePro

      RisePro stealer is an infostealer distributed by PrivateLoader.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Target

      7343af258896b872f85a24f931bee9fc4d58298b4225602c4a002334ee484164

    • Size

      2.7MB

    • MD5

      c5cdbbdd202788ff8fa33f596c4ccaee

    • SHA1

      e832a2983baf87f37d193a2a678b94d33388471d

    • SHA256

      7343af258896b872f85a24f931bee9fc4d58298b4225602c4a002334ee484164

    • SHA512

      851aa7fbf1cfe9478cd4b1945a5544774939cc3f2a382e4d2d154b3e0caf2cf25305871fd25eebb0e889234f9fb5247a88dccc00cadfcbfb639b936e54f6b886

    • SSDEEP

      49152:1BewLNXu0gElU2JGxhn34DKD3HXSdsGj9Q9ytayBjrbElZjf3H/1vPG:KwLNXu01PGXKiXXSdsQiytT9bEfjv/12

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • RisePro

      RisePro stealer is an infostealer distributed by PrivateLoader.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • Target

      913938eed99c7cecb554ea106699cb053edd02b8f457631f7e810dff3f3bbfa6

    • Size

      1003KB

    • MD5

      feba141404c20f7713a10f7de4bdc3dc

    • SHA1

      42d4e22f7323ab52583cfc36f3b7a61caca8b07d

    • SHA256

      913938eed99c7cecb554ea106699cb053edd02b8f457631f7e810dff3f3bbfa6

    • SHA512

      0d8a79e0fc8bea84cd6f36f07bdca4212c56434d45671f9c2d2ce3bfbeed1de74e667d3d9f55e8c123fc175d85a6e0f724029618d6bc99e37de8af133040b962

    • SSDEEP

      24576:oyCUqnCX6hfae5IsnC9GYlvDjfi9FHL6iUe:vCUqCeCei8+Gu3fi9FHU

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Executes dropped EXE

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Detected potential entity reuse from brand paypal.

    • Suspicious use of SetThreadContext

    • Target

      963caa90e29c238b3f03e62737f229b75eea1ca9df309b4f2016fe5bf9afee8b

    • Size

      493KB

    • MD5

      05d368231aa5fb5e92404aa8c8a8f25b

    • SHA1

      507d0aceed0d6b8204bbdd5d789fb464c32b1158

    • SHA256

      963caa90e29c238b3f03e62737f229b75eea1ca9df309b4f2016fe5bf9afee8b

    • SHA512

      c4eb44baf7fa479b769c249d1231e1ca5b3a3614e4b1e35e562206fe5bc6da56c77faa06ba1d983fa47d1f080f56609cc44ca921fb51eda4a9947e3fb717d27d

    • SSDEEP

      6144:o3nNKoPE2gZB/6fZOE0EUAOO1kKmxBuaLyvJTpkIroVLbyTy//55/766666qZ8x:6nNTPE2CEgRKuuaWvJVFro4TW/Cx

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Suspicious use of SetThreadContext

    • Target

      993b22cd0edfed671f3110dc80dd02946e17220bbeed7d83c7fc5abec04c3dbb

    • Size

      1.6MB

    • MD5

      cde93708fb08f4ae47dc256b109e2b54

    • SHA1

      096409118e46098236f3370ffa668f37da437796

    • SHA256

      993b22cd0edfed671f3110dc80dd02946e17220bbeed7d83c7fc5abec04c3dbb

    • SHA512

      b078111541414ca38bd153f7a084d7769966b1c1206e37807fd3a968cf4e9be7d91baf327a35b9d4c5f8fe082440fb2b406c4af4c6c6129f63a6841bcaa31383

    • SSDEEP

      49152:rmkhXyEuVucSv4SrAUwXl2f5Cxlrjhu5H:7uVucSv7xCDhmH

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • RisePro

      RisePro stealer is an infostealer distributed by PrivateLoader.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Target

      9e4d940a325e9b72d46353fc864673d69a691a5708c222a2124623dbb1d29056

    • Size

      877KB

    • MD5

      cdffd489744085d274dadb4d6b409596

    • SHA1

      e0fdec58945fe1e8f058541a8b5d9e38a5da42c4

    • SHA256

      9e4d940a325e9b72d46353fc864673d69a691a5708c222a2124623dbb1d29056

    • SHA512

      61e648ec1e8efe66ca7abc10ee9f599a10a0bb83a34f9365040ce0b573418c76ae598043a818fe771b837d308659fdf2a15093a59db7e386f33fa4cad2d63f54

    • SSDEEP

      12288:PMray90PmjjOxp0NldHCDaex4IC5ipCPHGkiPLvTMXiYQ5DJQqYQF0lZ6VEvFOi8:Zy9+I5caeuIseC/GRLYDDomZ6Yjw

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Detected potential entity reuse from brand paypal.

    • Suspicious use of SetThreadContext

    • Target

      b093b62b3c10bec126678999d01ec29829b6cd97661fc6492cc56c7a9503c93a

    • Size

      989KB

    • MD5

      4ce53a8b5e242c9786f4e5c93a30e998

    • SHA1

      a4e02da66013d27c523466e8cd5fc1c01a9fe7a5

    • SHA256

      b093b62b3c10bec126678999d01ec29829b6cd97661fc6492cc56c7a9503c93a

    • SHA512

      f6c2ffbf3b1bd4fb783f2745c6b0e551d83ee2143a76f8d7158700ec3ada488e74a5da61d47cb5b852d9668d3b4ff45e51c102b4c43e5cdf113da1953db79192

    • SSDEEP

      24576:OyatlDC2DSBNRzvfyb/7TJkVqbgvvLerBOHvQ2SfuBn:doENlUDVyqEvvGBOHv1G

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • RisePro

      RisePro stealer is an infostealer distributed by PrivateLoader.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Target

      b60133d8c678905dd786ba8cd2dfcb7357ea3c1adea3c733147a681537f91987

    • Size

      2.6MB

    • MD5

      c48b4ebdf324b060e53d1e3a96fa5158

    • SHA1

      c8d947e145ee5e19aa1d9ebd0c35f4601f8b4338

    • SHA256

      b60133d8c678905dd786ba8cd2dfcb7357ea3c1adea3c733147a681537f91987

    • SHA512

      45b17b13e650ee38c460cb85436ff1a07c1dd7a55c5fc9c9afedf36beda75ede698d507c76cb98a92d44d53a3a4b29a0bee78cd4fade1fd1f7ab65b0d0e328dd

    • SSDEEP

      49152:hyfcW4wLvAzhAxifZypwQFeNf2ZNBzWUCyEcdeRg70tyKqFaAE:4ftLGowQsf2ZXbZHwtLQE

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • RisePro

      RisePro stealer is an infostealer distributed by PrivateLoader.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops file in System32 directory

    • Target

      b88e4acc8b5bc7d78960ffffe70c54c5b2d30e7010e22306b70f7cc6b4629370

    • Size

      829KB

    • MD5

      96a6440125d3f9fb6e325bc1e4b5bc88

    • SHA1

      ad7c47b9c2dd836b2da0e0e012141f8d30906c22

    • SHA256

      b88e4acc8b5bc7d78960ffffe70c54c5b2d30e7010e22306b70f7cc6b4629370

    • SHA512

      b1b759316dcf09f46e55480f19a6d39b43cbae707037eb01d1c51cff5a700ab00d869e24a446d59d86eabdb8852a6b9943e82f43825dc00499c588e180c4fa11

    • SSDEEP

      12288:fMrYy90gR2R2SMb01E22U7bbe1pT0w2urAy3DOA2L8oHhiCo3uMZAUIg:ryFR2qu/2U7sGyh2cPug

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • RisePro

      RisePro stealer is an infostealer distributed by PrivateLoader.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • Target

      b9e66aabb221e3e3118a47d09299a0e6940e137a234b31c5a1aa3a72d2d96121

    • Size

      789KB

    • MD5

      aeb20c09dacf7778a36e577a5cb476bd

    • SHA1

      1d7b13d9bf182a709f05b136948f689b528347ca

    • SHA256

      b9e66aabb221e3e3118a47d09299a0e6940e137a234b31c5a1aa3a72d2d96121

    • SHA512

      b873b02dc06dca05fc4943b014736394b151a3c55492f0254e14da0941667b784c130d288dd4e7d8052b103b8c182e3635ae01b38ad0f2af8b507f07d07c1343

    • SSDEEP

      12288:XMrGy90DN8degBdF/RIqaSVJ3zQFo/DiK+BZhzSLU2qQCNQmhZNy/xUjDKMUa:1yW8dTBd9baS7QW7lkzSFuCyy/9Ba

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • RisePro

      RisePro stealer is an infostealer distributed by PrivateLoader.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops file in System32 directory

    • Target

      ba66c3ba45ca9b8976288e133180837ff25f0e016b2c79dc3945bba768329c93

    • Size

      2.1MB

    • MD5

      be615072e8646d8e499b85fee33b60cd

    • SHA1

      fd7a4137aa4f1beab319b97d9feb4d40492a633e

    • SHA256

      ba66c3ba45ca9b8976288e133180837ff25f0e016b2c79dc3945bba768329c93

    • SHA512

      03840c6b6089b0d217239de77cb05f900c03308e160313661fad5e06d77af61a70830a855bdbbd34830894ff2d3a1ba0ca921874552a911476670662cd4f3124

    • SSDEEP

      49152:l/NVoswjCaT3wOgdJrRuzs9bKouNd4EzJSGNma65i/yMQ2NvO:dj36r8jtlKouNVNNma+L2Q

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • RisePro

      RisePro stealer is an infostealer distributed by PrivateLoader.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Target

      ca4dd99dd7103ec05d0d43690019a1de3a654140e64a44ae16dc101ba0a5895e

    • Size

      2.1MB

    • MD5

      e72298e1229570303f68c0748359afe4

    • SHA1

      4e2791dfa5843f9981119e7d41252d508c48c359

    • SHA256

      ca4dd99dd7103ec05d0d43690019a1de3a654140e64a44ae16dc101ba0a5895e

    • SHA512

      475982c0463944a75024a3337cdac51c710e769708848f9b21eee6a716b18a4cdbff1b5512d5afce9a3c2aca626325ab9ac158554c573d3ecc6e038316ee086d

    • SSDEEP

      49152:BHX5eH4VARY7zgYS1wul1ZSTt/BJDaZs14yderdocL:84VbI91STJBJae4IqdvL

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • RisePro

      RisePro stealer is an infostealer distributed by PrivateLoader.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Target

      da83df46c9a090a82fe6e6cb5ea91ec010777168eccd438ca33ac3ac723c9ebd

    • Size

      944KB

    • MD5

      d20145d18c8bf943cf8402ab923bfa8e

    • SHA1

      08f4f5358625649f8016d73f7e7afeadbcd1883a

    • SHA256

      da83df46c9a090a82fe6e6cb5ea91ec010777168eccd438ca33ac3ac723c9ebd

    • SHA512

      8e98f14ca588dbe6a8eb666aa5f97927a87a8982937c02bc7bad04274fcb2599e9f230c84c3853598a04ff987e27434820896600e6eae9298f95d040f8bec1d4

    • SSDEEP

      12288:hQ2Ud1N4ybhEJpSUnRNIL0l37KgKINBJoLXNwsIcuJk8qn0M3keJ:EdHxbhEJgUnRNIYlZjJo5wRtuz

    • Target

      e40b0737038122a56b3737a041c631f84c0e0d0fd97111d05f689d73301a2e73

    • Size

      945KB

    • MD5

      989a50058922654db3c334d50cb34411

    • SHA1

      f704bf6ce1394da37c9763774cdddcb293bd85c8

    • SHA256

      e40b0737038122a56b3737a041c631f84c0e0d0fd97111d05f689d73301a2e73

    • SHA512

      63580d350715b2cf5d901fdc57d584f52b0b63254bb859c88b26d386b39f2e200b8dac7909dd4c13a23821b1220b560b44777b6bba0d7672eeab5034a1cc41de

    • SSDEEP

      12288:cMrhy90Awotp/LgB0J7XCLPc5hLFDj5TIO5B3coCETefiYyNk9oZ2vLIdD+PLAiY:VyBpTcgCL05hJDj5TIuBlHlFZ22Z

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • RisePro

      RisePro stealer is an infostealer distributed by PrivateLoader.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • Target

      e90aeb6eb581fc03df5540f7bbbc8cb887bb885815085075594020a3e9b2ec2c

    • Size

      866KB

    • MD5

      def702b14677805ca5b021e49cdf4273

    • SHA1

      1e1fa03ff8d36146111664321391be1961bb9ecd

    • SHA256

      e90aeb6eb581fc03df5540f7bbbc8cb887bb885815085075594020a3e9b2ec2c

    • SHA512

      cff785c1ff9b5dad586dd75b18ba78f1b5110bf1aeae7328d18196086a642dabb12e49d4c61f1e3321081efe72a0fbce2c659f9f7cf684be63cd1b4e32119793

    • SSDEEP

      24576:piyQXtYjSDrBNRzGDFv1JkyKbo+2VV+OA2Hlj409QJR:DQXtY+5NwDVDrK8+22Obj7o

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • RisePro

      RisePro stealer is an infostealer distributed by PrivateLoader.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Target

      fa7f367abb26ee1daca84a0703ee7110f42a619fee072651c4f5efff7f782ae6

    • Size

      828KB

    • MD5

      9a8cbcbb300df72f6c93da1567f0e176

    • SHA1

      a9f5be159153ae93dfb394d32f76d305dbe80317

    • SHA256

      fa7f367abb26ee1daca84a0703ee7110f42a619fee072651c4f5efff7f782ae6

    • SHA512

      a801fd697f85c2d1558114d133797a53c19f4c27b69096fd6e04191dc62fe432b8501697e4e8f2f21530bbed34ecbf4d67130ee73635364591b51a68829e9fe3

    • SSDEEP

      24576:kyESEkCre6R/VjmCUJXb+RpHQuSEKOBzETENgeCPn:z16R/VF44pHdScSANW

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • RisePro

      RisePro stealer is an infostealer distributed by PrivateLoader.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

static1

Score
3/10

behavioral1

privateloaderredlineriseprosmokeloaderhordabackdoorinfostealerloaderpersistencestealertrojan
Score
10/10

behavioral2

paypalpersistencephishing
Score
7/10

behavioral3

privateloaderredlineriseprohordainfostealerloaderpersistencestealer
Score
10/10

behavioral4

privateloaderredlineriseprotaigainfostealerloaderpersistencestealer
Score
10/10

behavioral5

privateloaderriseproloaderpersistencestealer
Score
10/10

behavioral6

privateloaderredlineriseprohordainfostealerloaderpersistencestealer
Score
10/10

behavioral7

mysticredlinesmokeloadertaigabackdoorpaypalinfostealerpersistencephishingstealertrojan
Score
10/10

behavioral8

redlinehordainfostealer
Score
10/10

behavioral9

redlinehordainfostealer
Score
10/10

behavioral10

privateloaderriseproloaderpersistencestealer
Score
10/10

behavioral11

mysticredlinetaigapaypalinfostealerpersistencephishingstealer
Score
10/10

behavioral12

privateloaderriseproloaderpersistencestealer
Score
10/10

behavioral13

privateloaderriseproloaderpersistencestealer
Score
10/10

behavioral14

privateloaderredlineriseprohordainfostealerloaderpersistencestealer
Score
10/10

behavioral15

privateloaderriseproloaderpersistencestealer
Score
10/10

behavioral16

privateloaderriseproloaderpersistencestealer
Score
10/10

behavioral17

privateloaderriseproloaderpersistencestealer
Score
10/10

behavioral18

smokeloaderbackdoortrojan
Score
10/10

behavioral19

smokeloaderbackdoortrojan
Score
10/10

behavioral20

privateloaderredlineriseprohordainfostealerloaderpersistencestealer
Score
10/10

behavioral21

privateloaderriseproloaderpersistencestealer
Score
10/10

behavioral22

privateloaderredlineriseprohordainfostealerloaderpersistencestealer
Score
10/10