{"id":4800,"date":"2023-04-18T07:53:25","date_gmt":"2023-04-18T07:53:25","guid":{"rendered":"\/cybersecurity-blog\/?p=4800"},"modified":"2023-04-19T09:01:30","modified_gmt":"2023-04-19T09:01:30","slug":"privateloader-analyzing-the-encryption-and-decryption-of-a-modern-loader","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/privateloader-analyzing-the-encryption-and-decryption-of-a-modern-loader\/","title":{"rendered":"PrivateLoader: Analyzing the Encryption and Decryption of a Modern Loader\u00a0"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<p>In this article, we delve into the inner workings of PrivateLoader, a notorious malicious loader family. We will explore the encryption and decryption processes utilized by this malware, particularly focusing on its ability to protect itself using VMProtect, as well as its decryption of loaded libraries. Let&#8217;s dive in!&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"841\" height=\"533\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-21.jpg\" alt=\"PrivateLoader\" class=\"wp-image-4807\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-21.jpg 841w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-21-300x190.jpg 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-21-768x487.jpg 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-21-370x234.jpg 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-21-270x171.jpg 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-21-740x469.jpg 740w\" sizes=\"(max-width: 841px) 100vw, 841px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>PrivateLoader analysis introduction<\/strong>&nbsp;<\/h2>\n\n\n\n<p>PrivateLoader is a malicious loader family, written in C++ and first discovered in&nbsp;early&nbsp;2021.&nbsp;<\/p>\n\n\n\n<p>It is known for distributing a wide range of malware, from simple information stealers to complex rootkits and spyware, utilizing payloads.&nbsp;<\/p>\n\n\n\n<p>The distribution of this type of malware is managed by the Pay-Per-Install (PPI) service, a popular tool within the cybercriminal ecosystem that generates revenue by adding payloads to malware.&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The code itself involves the decryption of loaded libraries.&nbsp;<\/li>\n\n\n\n<li>At present, there are two versions of PrivateLoader available: one protected by VMProtect, and a regular version.&nbsp;<\/li>\n\n\n\n<li>Every day, between 2 and 4 samples of this malware are uploaded.&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Static Analysis of the Source File&nbsp;<\/h2>\n\n\n\n<p><strong>SHA256: 27c1ed01c767f504642801a7e7a7de8d87dbc87dee88fbc5f6adb99f069afde4<\/strong>&nbsp;<\/p>\n\n\n\n<p>Using the <strong>Detect It Easy <\/strong>utility, we can see that the analyzed executable file is compiled in C++. There is no information about the packer, which could mean it was not possible to identify it.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"698\" height=\"121\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/image-1.png\" alt=\"PrivateLoader's sample data \" class=\"wp-image-4803\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/image-1.png 698w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/image-1-300x52.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/image-1-370x64.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/image-1-270x47.png 270w\" sizes=\"(max-width: 698px) 100vw, 698px\" \/><figcaption class=\"wp-element-caption\">Fig. 1 \u2013 PrivateLoader&#8217;s sample data&nbsp;<\/figcaption><\/figure>\n\n\n\n<p class=\"has-text-align-center has-small-font-size\"><\/p>\n\n\n\n<p>The next step is to search for unencrypted strings using the <strong>strings<\/strong> command:&nbsp;<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code><em>strings --encoding=l loader.exe<\/em>&nbsp;<\/code><\/pre>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"198\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-23-1024x198.png\" alt=\"Interesting strings detected in the executable file\u00a0\" class=\"wp-image-4835\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-23-1024x198.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-23-300x58.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-23-768x149.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-23-370x72.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-23-270x52.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-23-740x143.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-23.png 1063w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Fig. 2 &#8211; Interesting strings detected in the executable file&nbsp;<\/figcaption><\/figure>\n\n\n\n<p class=\"has-text-align-center has-small-font-size\"><\/p>\n\n\n\n<p>Analyzing the discovered strings allows us to identify several interesting elements:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A user-agent, which is likely used to masquerade as a legitimate browser application&nbsp;<\/li>\n\n\n\n<li>URL addresses for determining the current IP and geolocation&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>PrivateLoader dynamic analysis with ANY.RUN<\/strong>&nbsp;<\/h2>\n\n\n\n<p>We analyzed the sample in <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=privateloader&amp;utm_content=landing\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN interactive malware sandbox<\/a>. &nbsp;<\/p>\n\n\n\n<p>Here\u2019s a link to the task:<br> <a href=\"https:\/\/app.any.run\/tasks\/3e359dc7-934b-4ae1-89bf-ad33e346ed60?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=privateloader&amp;utm_content=task\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/app.any.run\/tasks\/3e359dc7-934b-4ae1-89bf-ad33e346ed60<\/a>&nbsp;<\/p>\n\n\n\n<p>The process tree generated by the executable file appears as follows:&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"498\" height=\"386\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/image-2.png\" alt=\"PrivateLoader's process tree\u00a0\" class=\"wp-image-4804\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/image-2.png 498w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/image-2-300x233.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/image-2-370x287.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/image-2-270x209.png 270w\" sizes=\"(max-width: 498px) 100vw, 498px\" \/><figcaption class=\"wp-element-caption\">Fig 3. &#8211; PrivateLoader&#8217;s process tree&nbsp;<\/figcaption><\/figure>\n\n\n\n<p><strong>Analyzing the process tree leads to the following conclusions:<\/strong>&nbsp;<\/p>\n\n\n\n<p>1. The main PrivateLoader process creates a child process named &#8220;FhuC750omh76YtB1xgR7diEy.exe&#8221;, whose executable file is located in the user&#8217;s &#8220;Pictures&#8221; directory (T1564 \u2013 Hide Artifacts):&nbsp;<\/p>\n\n\n\n<p>C:\\Users\\admin\\<strong>Pictures<\/strong>\\Minor Policy&nbsp;<\/p>\n\n\n\n<p>2. The created child process is added to the startup using Task Scheduler (T1053.005 &#8211; Scheduled Task\/Job: Scheduled Task):&nbsp;<\/p>\n\n\n\n<p><strong>schtasks <\/strong>\/create \/f \/RU &#8220;admin&#8221; \/tr &#8220;&#8221;C:\\Program Files (x86)\\ClipManagerP0\\ClipManager_Svc.exe&#8221;&#8221; \/tn &#8220;LOLPA4DESK HR&#8221; \/sc HOURLY \/rl HIGHEST&nbsp;<\/p>\n\n\n\n<p>The executable file of the child process was downloaded from the Internet (T1105 \u2013 Ingress Tool Transfer). We will not go into the&nbsp;detailed analysis of it.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"70\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-24-1-1024x70.png\" alt=\"PrivateLoader downloaded payload\u00a0\" class=\"wp-image-4837\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-24-1-1024x70.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-24-1-300x20.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-24-1-768x52.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-24-1-1536x105.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-24-1-370x25.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-24-1-270x18.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-24-1-740x50.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-24-1.png 1600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Fig 4. &#8211; PrivateLoader downloaded payload&nbsp;<\/figcaption><\/figure>\n\n\n\n<p class=\"has-text-align-center has-small-font-size\"><\/p>\n\n\n\n<p>Analyzing the HTTP requests, we can observe connections and data exchanges with the C2 server (T1071.001 &#8211; Application Layer Protocol):&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"86\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-25-1-1024x86.png\" alt=\"PrivateLoader  \u04212 addresses\u00a0\" class=\"wp-image-4839\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-25-1-1024x86.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-25-1-300x25.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-25-1-768x65.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-25-1-1536x130.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-25-1-370x31.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-25-1-270x23.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-25-1-740x62.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-25-1.png 1600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Fig. 5 &#8211; \u04212 addresses&nbsp;<\/figcaption><\/figure>\n\n\n\n<p>The content sent (as well as received) in POST requests consists of BASE64-encoded strings (T1132.001 &#8211; Data Encoding: Standard Encoding). Decoding these strings does not yield any readable results:&nbsp;<\/p>\n\n\n\n<p>data=-kSYhy9HPjD5Jhn9y6Evty4XFfJ3JgIwrSzln5bGnLfKDmbXix2ebDEXy6Ty3Bb8Hz2GB8w0Y2SL2JeBSZ4G80iHAkSS7JJyeiPwZOpWJONOFzEBarRHP-ljR9hkvX_TJhqr1nNqQpYUB2lQ9i7NmmHeL_QSx8hUka_C3jOxi02ml5FyDDruXM_IWwPXvAGxtT8TV-i9wLtfd0mF1O369GUAEeI45sF1pKeyDfssmqE=&nbsp;<\/p>\n\n\n\n<p>Moving forward to&nbsp;the indicators, we can see that the malware steals user credentials from browsers (T1552.001 Credentials In Files):&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"476\" height=\"365\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/image-3.png\" alt=\"PrivateLoader Stealing data\u00a0\" class=\"wp-image-4805\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/image-3.png 476w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/image-3-300x230.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/image-3-370x284.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/image-3-270x207.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/image-3-80x60.png 80w\" sizes=\"(max-width: 476px) 100vw, 476px\" \/><figcaption class=\"wp-element-caption\">Fig. 6 &#8211; Stealing data&nbsp;<\/figcaption><\/figure>\n\n\n\n<p class=\"has-text-align-center has-small-font-size\"><\/p>\n\n\n\n    <div class=\"post-footer\">\n      <div class=\"post-footer-banner\">\n        <p class=\"post-footer-banner__text\">\n          Free <span>malware research<\/span> with ANY.RUN\n        <\/p>\n        <div class=\"post-footer-banner__button-warp\">\n          <a href=\"https:\/\/app.any.run\/#register\" id=\"post-footer-banner\" target=\"_blank\" class=\"post-footer-banner__button\">\n            Start Now!\n          <\/a>\n        <\/div>\n      <\/div>\n    <\/div>\n  \n\n\n\n<h2 class=\"wp-block-heading\"><strong>Technical Analysis of PrivateLoader&nbsp;<\/strong>&nbsp;<\/h2>\n\n\n\n<p>For the technical analysis, the following tasks were set:&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"1\">\n<li>Locate the C2 server within the code&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\">\n<li>Identify the encryption algorithms for the C2 server and, if possible, for strings as well.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"3\">\n<li>Automate the decryption of the C2 server and strings&nbsp;<\/li>\n<\/ol>\n\n\n\n<p>The analysis of the executable file revealed that string encryption is done using the XOR algorithm (T1027 &#8211; Obfuscated Files or Information). Initially, the data and key are loaded into the stack, and then decrypted using the SIMD instruction &#8220;PXOR&#8221; and the &#8220;XMM&#8221; register. The result of the XOR operation is also stored in the stack.&nbsp;<\/p>\n\n\n\n<p><strong>The three stages of C2 server decryption are shown below.&nbsp;<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"1\">\n<li>Loading encrypted data into the stack:&nbsp;<\/li>\n<\/ol>\n\n\n\n<p class=\"has-text-align-center has-small-font-size\"><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"431\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-26-1024x431.png\" alt=\"PrivateLoader data\" class=\"wp-image-4840\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-26-1024x431.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-26-300x126.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-26-768x323.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-26-370x156.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-26-270x114.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-26-740x311.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-26.png 1397w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Fig. 7 &#8211; Data&nbsp;<\/figcaption><\/figure>\n\n\n\n<p class=\"has-text-align-center has-small-font-size\"><\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\">\n<li>Loading the encryption key into the stack:&nbsp;<\/li>\n<\/ol>\n\n\n\n<p class=\"has-text-align-center has-small-font-size\"><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"433\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-27-1024x433.png\" alt=\"Key PrivateLoader\" class=\"wp-image-4841\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-27-1024x433.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-27-300x127.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-27-768x324.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-27-370x156.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-27-270x114.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-27-740x313.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-27.png 1394w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Fig. 8 &#8211; Key&nbsp;<\/figcaption><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"3\">\n<li>Decrypting the C2 server using the &#8220;PXOR&#8221; instruction and saving the results in the stack:&nbsp;<\/li>\n<\/ol>\n\n\n\n<p class=\"has-text-align-center has-small-font-size\"><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"418\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-28-1-1024x418.png\" alt=\"Decrypting PrivateLoader\" class=\"wp-image-4843\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-28-1-1024x418.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-28-1-300x122.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-28-1-768x314.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-28-1-370x151.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-28-1-270x110.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-28-1-740x302.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-28-1.png 1396w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Fig. 9 \u2013 Decrypting&nbsp;<\/figcaption><\/figure>\n\n\n\n<p>During the analysis process, it was also found that the method similar to C2 decryption is used to decrypt the following:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Used API functions (T1027.007 &#8211; Obfuscated Files or Information: Dynamic API Resolution)&nbsp;<\/li>\n\n\n\n<li>Payloads&nbsp;<\/li>\n\n\n\n<li>URLs and more<\/li>\n<\/ul>\n\n\n\n<p>Some of the analyzed samples are protected by VMProtect. The search for string decryption is complicated by the fact that the decryption data is located in one function, while the XOR and key are in another. Moreover, the key is always the same.&nbsp;<\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"509\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-30-1024x509.png\" alt=\"\" class=\"wp-image-4847\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-30-1024x509.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-30-300x149.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-30-768x382.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-30-370x184.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-30-270x134.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-30-740x368.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-30.png 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Fig 10. &#8211; Decript VMprotect sample<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Example of automating C2 server decryption&nbsp;of PrivateLoader<\/strong>&nbsp;<\/h2>\n\n\n\n<p>To automate the extraction of data and configuration, we can use the <a href=\"https:\/\/github.com\/JonathanSalwan\/Triton\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Triton<\/a> framework. It will emulate code blocks that contain all the necessary encrypted&nbsp;information.<\/p>\n\n\n\n<p>You can find <a href=\"https:\/\/github.com\/anyrun\/blog-scripts\/blob\/main\/Extractors\/Privateloader\/PrivateLoader.py?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=privateloader&amp;utm_content=script\" target=\"_blank\" rel=\"noreferrer noopener\">an example of a script<\/a> for emulating a specific block in our GitHub repository. The output of the script will be the decrypted C2 server.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"826\" height=\"378\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/image-4.png\" alt=\"PrivateLoader Script output \" class=\"wp-image-4806\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/image-4.png 826w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/image-4-300x137.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/image-4-768x351.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/image-4-370x169.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/image-4-270x124.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/image-4-740x339.png 740w\" sizes=\"(max-width: 826px) 100vw, 826px\" \/><figcaption class=\"wp-element-caption\">Fig 11. &#8211; Script output&nbsp;<\/figcaption><\/figure>\n\n\n\n<p class=\"has-text-align-center has-small-font-size\"><\/p>\n\n\n\n<p>Therefore, by emulating all the code blocks that contain encrypted data, we can obtain a set of strings with the necessary information, including the C2 server.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Extracting the PrivateLoader configuration<\/strong>&nbsp;<\/h2>\n\n\n\n<p>In our service, you can view the configuration, which is extracted automatically:&nbsp;<\/p>\n\n\n\n<p class=\"has-text-align-center has-small-font-size\"><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"872\" height=\"586\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-29-1.png\" alt=\"PrivateLoader configution and strings\" class=\"wp-image-4845\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-29-1.png 872w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-29-1-300x202.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-29-1-768x516.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-29-1-370x249.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-29-1-270x181.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/MicrosoftTeams-image-29-1-740x497.png 740w\" sizes=\"(max-width: 872px) 100vw, 872px\" \/><figcaption class=\"wp-element-caption\">&nbsp;Fig. 12 &#8211; PrivateLoader configution and strings<\/figcaption><\/figure>\n\n\n\n<p>The decrypted data includes C2 addresses and strings. The strings contain information such as: used libraries and their functions, registry keys, paths to crypto wallets and browsers, etc.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Conclusion<\/strong>&nbsp;<\/h2>\n\n\n\n<p>In this article, we discussed encryption in PrivateLoader.&nbsp;<\/p>\n\n\n\n<p>Its main feature is the XOR of all strings it interacts with (C2, URLs, DLLs). Also, some samples are protected by VMprotect, which makes the code a bit more complex due to the use of many functions.&nbsp;<\/p>\n\n\n\n<p>If you\u2019d like to read more content like this, read our <a href=\"https:\/\/any.run\/cybersecurity-blog\/limerat-malware-analysis\/\" target=\"_blank\" rel=\"noreferrer noopener\">LimeRAT Malware Analysis<\/a>. Or check out our deep dive into the <a href=\"https:\/\/any.run\/cybersecurity-blog\/xloader-formbook-encryption-analysis-and-malware-decryption\/\" target=\"_blank\" rel=\"noreferrer noopener\">encryption and decryption process of XLoader\/FormBook<\/a>.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">MITRE (ARMATTACK)&nbsp;<\/h2>\n\n\n\n<figure class=\"wp-block-table has-small-font-size\"><table class=\"has-fixed-layout\"><tbody><tr><td><strong>Tactics<\/strong>&nbsp;<\/td><td><strong>Techniques<\/strong>&nbsp;<\/td><td><strong>Description<\/strong>&nbsp;<\/td><\/tr><tr><td>TA0007:&nbsp;<br>Software discovery&nbsp;<\/td><td>T1518:&nbsp;<br>Software Discovery&nbsp;<\/td><td>Searches for installed software&nbsp;<br>in the system &nbsp;<br>in the \u201cUninstall\u201d key&nbsp;<\/td><\/tr><tr><td>&nbsp;<br>&nbsp;<\/td><td>T1082:&nbsp;<br>System Information&nbsp;<br>Discovery&nbsp;<\/td><td>Collects system data&nbsp;<\/td><\/tr><tr><td>TA0011:&nbsp;<br>Command and Control&nbsp;<\/td><td>T1071.001:&nbsp;<br>Application Layer &nbsp;<br>Protocol&nbsp;<\/td><td>Sending collected data &nbsp;<br>to the control server&nbsp;<\/td><\/tr><tr><td>&nbsp;<\/td><td>T1105 Ingress Tool Transfer&nbsp;<\/td><td>requests binary from the Internet&nbsp;<\/td><\/tr><tr><td>&nbsp;<\/td><td>T1132.001 &#8211; Data Encoding: <br>Standard Encoding&nbsp;<\/td><td>encode data with BASE64&nbsp;<\/td><\/tr><tr><td>TA0006:&nbsp;Credential Access&nbsp;<\/td><td>T1552.001: Credentials In Files&nbsp;<\/td><td>Stealing of personal data \u2013 login data&nbsp;<\/td><\/tr><tr><td>TA0005:&nbsp;Defense Evasion&nbsp;<\/td><td>T1564&nbsp; Hide Artifacts&nbsp;<\/td><td>attempt to hide artifacts in user folder&nbsp;<\/td><\/tr><tr><td>&nbsp;<\/td><td>T1027.007 &#8211; Obfuscated Files or<br> Information: Dynamic <br>API Resolution&nbsp;&nbsp;<\/td><td>obfuscate then dynamically resolve API <br>functions called by their malware&nbsp;<\/td><\/tr><tr><td>&nbsp;<\/td><td>T1027 &#8211; Obfuscated Files or Information&nbsp;<\/td><td>attempt to make an executable or<br> file difficult to discover or <br>analyze by encrypting XOR&nbsp;<\/td><\/tr><tr><td>TA0002:&nbsp;Execution&nbsp;<\/td><td>T1053.005 &#8211; Scheduled <br>Task\/Job: Scheduled Task&nbsp;<\/td><td>abuse the Windows Task <br>Scheduler to create file in statup&nbsp;<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>IOCs<\/strong>&nbsp;<\/h2>\n\n\n\n<figure class=\"wp-block-table has-small-font-size\"><table><tbody><tr><td><strong>Title<\/strong>&nbsp;<\/td><td><strong>Description<\/strong>&nbsp;<\/td><\/tr><tr><td>Name&nbsp;<\/td><td>27c1ed01c767f504642801a7e7a7de8d87dbc87dee88fbc5f6adb99f069afde4 exe&nbsp;<\/td><\/tr><tr><td>MD5&nbsp;<\/td><td>6cc7d9664c1a89c58549e57b5959bb38&nbsp;<\/td><\/tr><tr><td>SHA1&nbsp;<\/td><td>85b665c501b9ab38710050e9a5c1b6d2e96acccc&nbsp;<\/td><\/tr><tr><td>SHA256&nbsp;<\/td><td>27c1ed01c767f504642801a7e7a7de8d87dbc87dee88fbc5f6adb99f069afde4&nbsp;<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Extracted URLs&nbsp;<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>http:\/\/23[.]254[.]227[.]214\/api\/tracemap[.]php&nbsp;&nbsp;<\/li>\n\n\n\n<li>http:\/\/23[.]254[.]227[.]205\/api\/tracemap[.]php&nbsp;&nbsp;<\/li>\n\n\n\n<li>http:\/\/23[.]254[.]227[.]202\/api\/tracemap[.]php&nbsp;&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>http:\/\/208[.]67[.]104[.]60\/api\/tracemap[.]php&nbsp;&nbsp;<\/li>\n\n\n\n<li>http:\/\/208[.]67[.]104[.]60\/api\/firegate[.]php&nbsp;&nbsp;<\/li>\n\n\n\n<li>http:\/\/163[.]123[.]143[.]4\/download\/YT_Client[.]exe&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Dropped executable file&nbsp;<\/h2>\n\n\n\n<figure class=\"wp-block-table has-small-font-size\"><table><tbody><tr><td><strong>Title<\/strong>&nbsp;<\/td><td><strong>Description<\/strong>&nbsp;<\/td><\/tr><tr><td>Name&nbsp;<\/td><td>C:\\Users\\admin\\AppData\\Local\\Microsoft\\Windows\\INetCache\\IE\\AH8CR9J5\\YT_Client[1].exe&nbsp;<\/td><\/tr><tr><td>SHA256&nbsp;<\/td><td>041f891934add72852c8fda245c95da959d7f98cc580383d198e42f2de039634&nbsp;<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">DNS requests&nbsp;<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>iplogger.org&nbsp;&nbsp;<\/li>\n\n\n\n<li>ipinfo.io&nbsp;&nbsp;<\/li>\n\n\n\n<li>Iplis.ru&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Connections (IP)&nbsp;<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>&#8220;23[.]254.227.214&#8221;&nbsp;<\/li>\n\n\n\n<li>&#8220;23[.]254.227.202&#8221;&nbsp;<\/li>\n\n\n\n<li>&#8220;23[.]254.227.205&#8221;&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>&nbsp;&#8220;208[.]67.104.60&#8221;&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">MORE SAMPLES FOR YOUR RESEARCH&nbsp;<\/h2>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/ff1872a6-6c1f-4f79-89da-995b9bd56152\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/app.any.run\/tasks\/ff1872a6-6c1f-4f79-89da-995b9bd56152\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/6a8f93eb-be36-41bc-bf7f-534938a7e3a2\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/app.any.run\/tasks\/6a8f93eb-be36-41bc-bf7f-534938a7e3a2\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/cc2cb367-82e9-4705-9767-8c12f7a67a21\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/app.any.run\/tasks\/cc2cb367-82e9-4705-9767-8c12f7a67a21\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/c32312d8-4026-4a81-84e5-3d90ab2e309a\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/app.any.run\/tasks\/c32312d8-4026-4a81-84e5-3d90ab2e309a\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/235754fa-6aa3-49dd-bbc4-1a7f9361f455\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/app.any.run\/tasks\/235754fa-6aa3-49dd-bbc4-1a7f9361f455\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this article, we delve into the inner workings of PrivateLoader, a notorious malicious loader family. We will explore the encryption and decryption processes utilized by this malware, particularly focusing on its ability to protect itself using VMProtect, as well as its decryption of loaded libraries. Let&#8217;s dive in!&nbsp; PrivateLoader analysis introduction&nbsp; PrivateLoader is a [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":4801,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[15,34,40],"class_list":["post-4800","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware-analysis","tag-malware","tag-malware-analysis","tag-malware-behavior"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>PrivateLoader. Analyzing the Malware Encryption and Decryption<\/title>\n<meta name=\"description\" content=\"Read our malware analysis of PrivateLoader: encryption methods, VMProtect usage, decryption processes, how it targets Windows systems, etc.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/privateloader-analyzing-the-encryption-and-decryption-of-a-modern-loader\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"khr0x\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/privateloader-analyzing-the-encryption-and-decryption-of-a-modern-loader\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/privateloader-analyzing-the-encryption-and-decryption-of-a-modern-loader\/\"},\"author\":{\"name\":\"khr0x\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"PrivateLoader: Analyzing the Encryption and Decryption of a Modern Loader\u00a0\",\"datePublished\":\"2023-04-18T07:53:25+00:00\",\"dateModified\":\"2023-04-19T09:01:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/privateloader-analyzing-the-encryption-and-decryption-of-a-modern-loader\/\"},\"wordCount\":1546,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"malware\",\"malware analysis\",\"malware behavior\"],\"articleSection\":[\"Malware Analysis\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/privateloader-analyzing-the-encryption-and-decryption-of-a-modern-loader\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/privateloader-analyzing-the-encryption-and-decryption-of-a-modern-loader\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/privateloader-analyzing-the-encryption-and-decryption-of-a-modern-loader\/\",\"name\":\"PrivateLoader. Analyzing the Malware Encryption and Decryption\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2023-04-18T07:53:25+00:00\",\"dateModified\":\"2023-04-19T09:01:30+00:00\",\"description\":\"Read our malware analysis of PrivateLoader: encryption methods, VMProtect usage, decryption processes, how it targets Windows systems, etc.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/privateloader-analyzing-the-encryption-and-decryption-of-a-modern-loader\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/privateloader-analyzing-the-encryption-and-decryption-of-a-modern-loader\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/privateloader-analyzing-the-encryption-and-decryption-of-a-modern-loader\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Malware Analysis\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/malware-analysis\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"PrivateLoader: Analyzing the Encryption and Decryption of a Modern Loader\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"khr0x\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/ghIpC7Xf4_I-1.jpg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/ghIpC7Xf4_I-1.jpg\",\"caption\":\"khr0x\"},\"description\":\"I'm 21 years old and I work as a malware analyst for more than a year. I like finding out what kind of malware got on my computer. In my spare time I do sports and play video games.\",\"url\":\"#molongui-disabled-link\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"PrivateLoader. Analyzing the Malware Encryption and Decryption","description":"Read our malware analysis of PrivateLoader: encryption methods, VMProtect usage, decryption processes, how it targets Windows systems, etc.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/privateloader-analyzing-the-encryption-and-decryption-of-a-modern-loader\/","twitter_misc":{"Written by":"khr0x","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/privateloader-analyzing-the-encryption-and-decryption-of-a-modern-loader\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/privateloader-analyzing-the-encryption-and-decryption-of-a-modern-loader\/"},"author":{"name":"khr0x","@id":"https:\/\/any.run\/"},"headline":"PrivateLoader: Analyzing the Encryption and Decryption of a Modern Loader\u00a0","datePublished":"2023-04-18T07:53:25+00:00","dateModified":"2023-04-19T09:01:30+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/privateloader-analyzing-the-encryption-and-decryption-of-a-modern-loader\/"},"wordCount":1546,"commentCount":1,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["malware","malware analysis","malware behavior"],"articleSection":["Malware Analysis"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/privateloader-analyzing-the-encryption-and-decryption-of-a-modern-loader\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/privateloader-analyzing-the-encryption-and-decryption-of-a-modern-loader\/","url":"https:\/\/any.run\/cybersecurity-blog\/privateloader-analyzing-the-encryption-and-decryption-of-a-modern-loader\/","name":"PrivateLoader. Analyzing the Malware Encryption and Decryption","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2023-04-18T07:53:25+00:00","dateModified":"2023-04-19T09:01:30+00:00","description":"Read our malware analysis of PrivateLoader: encryption methods, VMProtect usage, decryption processes, how it targets Windows systems, etc.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/privateloader-analyzing-the-encryption-and-decryption-of-a-modern-loader\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/privateloader-analyzing-the-encryption-and-decryption-of-a-modern-loader\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/privateloader-analyzing-the-encryption-and-decryption-of-a-modern-loader\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Malware Analysis","item":"https:\/\/any.run\/cybersecurity-blog\/category\/malware-analysis\/"},{"@type":"ListItem","position":3,"name":"PrivateLoader: Analyzing the Encryption and Decryption of a Modern Loader\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"khr0x","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/ghIpC7Xf4_I-1.jpg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/ghIpC7Xf4_I-1.jpg","caption":"khr0x"},"description":"I'm 21 years old and I work as a malware analyst for more than a year. I like finding out what kind of malware got on my computer. In my spare time I do sports and play video games.","url":"#molongui-disabled-link"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/4800"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=4800"}],"version-history":[{"count":19,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/4800\/revisions"}],"predecessor-version":[{"id":4851,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/4800\/revisions\/4851"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/4801"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=4800"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=4800"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=4800"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}