Behavioral task
behavioral1
Sample
4cfbdd8acdc923beeca12d94f06d2f1632765434a2087df7ac803c254a0adf9c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4cfbdd8acdc923beeca12d94f06d2f1632765434a2087df7ac803c254a0adf9c.exe
Resource
win10v2004-20241007-en
General
-
Target
0f74cae93c7d8a7870addc797260fe2376fb5879cdc689ee065ef54780915b5c
-
Size
1.4MB
-
MD5
7c2bd55060ce9be10fd01619d0b3cb83
-
SHA1
a0d3602ae76073010fabbb6620970b8517289547
-
SHA256
0f74cae93c7d8a7870addc797260fe2376fb5879cdc689ee065ef54780915b5c
-
SHA512
311db357af242ca24d1e13e692e7b58e25cc576c80fc3a310f3ccfced58c9c7ae83ccdc1ac56dab728a29ac6f804149e6c798ed490838b75798bec37a45cd4f2
-
SSDEEP
24576:b6I5nm2EO98vnHBoIKfB/uBDIzpoi6FxX8Q2vnc3vUwUqRfXVSwi5e5+H:u6wny7f5ConWXEcFUYf8wiM5+H
Malware Config
Extracted
privateloader
http://37.0.10.214/proxies.txt
http://37.0.10.244/server.txt
http://wfsdragon.ru/api/setStats.php
37.0.10.237
Signatures
-
Privateloader family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/4cfbdd8acdc923beeca12d94f06d2f1632765434a2087df7ac803c254a0adf9c
Files
-
0f74cae93c7d8a7870addc797260fe2376fb5879cdc689ee065ef54780915b5c.zip
Password: infected
-
4cfbdd8acdc923beeca12d94f06d2f1632765434a2087df7ac803c254a0adf9c.exe windows:6 windows x86 arch:x86
9589ad8837113b4b31a6a8a07cbda1f9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetPriorityClass
GetCurrentProcess
lstrcatA
GetModuleHandleA
SetCurrentDirectoryA
GetModuleHandleExA
DeleteFileA
lstrcpyA
GetProcAddress
GetLastError
HeapFree
lstrlenA
HeapAlloc
lstrcpynA
GetProcessHeap
WriteConsoleW
QueryPerformanceCounter
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
CloseHandle
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetEvent
ResetEvent
WaitForSingleObjectEx
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
TerminateProcess
RaiseException
RtlUnwind
FreeLibrary
LoadLibraryExW
EncodePointer
ReadFile
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
GetStdHandle
WriteFile
SetFilePointerEx
GetConsoleMode
ReadConsoleW
GetFileType
LCMapStringW
GetConsoleOutputCP
GetFileSizeEx
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
GetStringTypeW
CreateFileW
FlushFileBuffers
HeapSize
HeapReAlloc
SetEndOfFile
DecodePointer
Sections
.text Size: 146KB - Virtual size: 145KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ