General

  • Target

    0a95ad0535baeef34122bddd80f99bb62ee3ad26

  • Size

    5.0MB

  • Sample

    241107-jpbw4aycjb

  • MD5

    c085dd87b5d18ee9c8ec38a2977440b5

  • SHA1

    0a95ad0535baeef34122bddd80f99bb62ee3ad26

  • SHA256

    d849f1f013d633d91a68258551a54b20246ea20b33775a7b29096f85d7f35bd5

  • SHA512

    c398d6b66913123024ee5c96731e7b6e0e0f5f9a8f71c0efb352e410277e2d1d0e1e437b972f01801c71a698e6db9900d68d822ca20eac63c54932ca7fbcbdc1

  • SSDEEP

    98304:OrgTFbeYp25aGhBrZXdAsjzAcu2tsnSDZc6K/jdZ/cAUdAEX9CrcGgDI1:nap7BrZN7w2un6/K//LEXEcxDI1

Malware Config

Extracted

Family

privateloader

C2

http://212.193.30.45/proxies.txt

http://85.202.169.116/server.txt

pastebin.com/raw/A7dSG1te

http://wfsdragon.ru/api/setStats.php

85.202.169.116

Targets

    • Target

      6ca26fbe131ceb76d05709c5df672110dc50148c791d8079eeb7d988025aef46

    • Size

      5.1MB

    • MD5

      bddbc9360dfb7c83b96437a0ca77aae1

    • SHA1

      88c82298dd32e2826743caeca5b82acf6583eee7

    • SHA256

      6ca26fbe131ceb76d05709c5df672110dc50148c791d8079eeb7d988025aef46

    • SHA512

      2a066a7e0b38d1c755d67757e4fe67eb12fefcce4aca078ae5f3f554cfd60415a5676c82a0d9eb6de9eef9327cee8eb1038f45d730fa2314e561ea2120f21224

    • SSDEEP

      98304:YNd6oQypwQq73QOB6+KPZtshYIyVGf+GBycKgeE7lXK:Yb6oQewQqbQO0+KPLsiVs+GVKjE7l6

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • Privateloader family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks