BLACK FRIDAY: 2-for-1 offer NOVEMBER 20 - 26 See details

PrivateLoader

54
Global rank
17
Month rank
22
Week rank
151
IOCs

PrivateLoader is a malware family that is specifically created to infect computer systems and drop additional malicious programs. It operates using a pay-per-install business model, which means that the individuals behind it are paid for each instance of successful deployment of different types of harmful programs, including trojans, stealers, and other ransomware.

Loader
Type
ex-USSR
Origin
1 May, 2021
First seen
1 December, 2023
Last seen

How to analyze PrivateLoader with ANY.RUN

Type
ex-USSR
Origin
1 May, 2021
First seen
1 December, 2023
Last seen

IOCs

IP addresses
185.216.70.235
91.92.243.151
194.49.94.113
94.142.138.113
208.67.104.60
94.142.138.131
193.42.32.118
85.208.136.10
1.1.1.1
45.15.156.229
94.131.106.196
5.181.80.133
163.123.143.12
37.0.11.9
149.154.158.34
136.144.41.152
23.254.227.214
23.254.227.202
23.254.227.205
37.0.11.41
Hashes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http://wfsdragon.ru/api/setStats.php
http://91.241.19.125/pub.php
http://sarfoods.com/index.php
http://www.maxmind.com/geoip/v2.1/city/me
http://ipinfo.io/widget
http://api.db-ip.com/v2/
http://discordapp.com/api/users/@me
http://ipinfo.io/widget/demo/
http://api64.ipify.org/
http://db-ip.com/demo/home.php
http://discord.com/api/v9/users/@me
http://212.193.30.115/base/api/getData.php
http://212.193.30.115/base/api/statistics.php
http://softs-portal.com/api/registerUser.php
http://d-rise.cc/MWTSL/get_settings.php
http://d-rise.cc/MWTSL/get_loaders.php
http://d-rise.cc/MWTSL/inc_loader.php
http://d-rise.cc/MWTSL/get_grabbers.php
http://d-rise.cc/MWTSL/get_marks.php
http://d-rise.cc/MWTSL/get_library.php
Last Seen at
Last Seen at

Recent blog posts

3 Cybersecurity Events ANY.RUN Attended in No...
watchers 142
comments 0
5 malware threats we discovered in the wild i...
watchers 345
comments 0
RisePro Malware Analysis: Exploring C2 Commun...
watchers 2314
comments 0

What is PrivateLoader malware?

PrivateLoader is a loader, which serves to embed other malware families on compromised systems. The creators of this malicious software, who are likely to be from ex-USSR countries, monetize their activity by charging various threat actors for the installation of their particular type of payload. The services are advertised openly on forums and Telegram channels, making them widely accessible.

The earliest instances of the malware’s activity can be traced to the beginning of 2021. However, researchers were able to spot it for the first time only in 2022, when it gained notoriety as the most widely used loader of the year.

A common vector of infection in the case of PrivateLoader has been through websites offering cracked versions of popular software. Once victims downloaded a file from such sites and ran an alleged software executable, they launched a chain reaction, which led to the installation of PrivateLoader and eventually to a trojan, stealer, or another type of malware being deployed on their system.

Some of the known malware families that have been pushed by PrivateLoader include Redline, DCRAT, Raccoon, and Smokeloader.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

Technical details of the PrivateLoader malicious software

PrivateLoader is written in C++ and has a control panel, allowing operators to manage its activity, including by adding new payload links and tracking the total number of installations.

PrivateLoader is set up to drop payloads depending on the configuration of each victim’s system. For instance, it can distribute malware based on the geo location. It can also scan the machine to determine if there are any crypto wallets installed and see banking credentials. Yet, in most cases, it does not exfiltrate this information.

PrivateLoader is a modular threat, consisting of three distinct parts, each with its own purpose. It starts with the Loader module, which is intended for downloading the main Core module. The latter then contacts the command-and-control server (C2) and drops the next-stage threat, as well as the Service module that is regularly updated and responsible for keeping the loader on the victim’s system. In certain instances, PrivateLoader can drop several payloads.

The malware also makes use of the Dead Drop Resolver technique, where it utilizes legitimate services, such as Discord, to host malicious payloads.

PrivateLoader employs various techniques to prevent analysis, including encrypting its important strings and obfuscating the C2 communication.

Execution process of PrivateLoader

Let’s see how PrivateLoader operates in detail by uploading its sample to ANY.RUN, an interactive sandbox for malware analysis.

The main PrivateLoader process creates a child process whose executable file is located in the user’s “Pictures” directory. The created child process is added to the startup using Task Scheduler. The executable file of the child process was downloaded from the Internet.

Analyzing the HTTP requests, we can observe connections and data exchanges with the C2 server. The content sent (as well as received) in POST requests consists of BASE64-encoded strings. Moving forward to the indicators, we can see that the malware steals user credentials from browsers.

Read a detailed analysis of PrivateLoader in our blog.

PrivateLoader process tree shown in ANY.RUN PrivateLoader’s process tree demonstrated in ANY.RUN

Distribution methods of the PrivateLoader malware

As mentioned above, the primary way PrivateLoader can infect a computer is via a direct download. Attackers employ SEO poisoning to boost the ranking of their websites. Users visit these links in search of different types of legitimate programs. Yet, after downloading an archive from the website and opening its contents, an infection begins, allowing PrivateLoader to compromise the entire system.

Conclusion

PrivateLoader is a serious threat to organizations and individuals because of the scale of its operation, as it can infect hundreds of thousands of computers in a short period of time. In order to avoid falling victim to this and other malware, it is vital to steer clear of suspicious websites and never download software from unofficial sources.

To determine whether a certain file or link is malicious, use ANY.RUN. It is a malware sandbox that provides users with the ability to interact with the samples at hand in a safe cloud environment. For instance, PrivateLoader usually comes packed into a passworded archive. ANY.RUN lets you easily open it, extract the contents, and run them as if you were using your own computer to expose any harmful behavior and collect IOCs.

Try ANY.RUN for free – request a demo!

HAVE A LOOK AT

Adwind screenshot
Adwind
adwind trojan
Adwind RAT, sometimes also called Unrecom, Sockrat, Frutas, jRat, and JSocket, is a Malware As A Service Remote Access Trojan that attackers can use to collect information from infected machines. It was one of the most popular RATs in the market in 2015.
Read More
Agent Tesla screenshot
Agent Tesla
agenttesla trojan rat stealer
Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.
Read More
Amadey screenshot
Amadey
amadey
Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks.
Read More
Arkei screenshot
Arkei
arkei stealer
Arkei is a stealer type malware capable of collecting passwords, autosaved forms, cryptocurrency wallet credentials, and files.
Read More
AsyncRAT screenshot
AsyncRAT
asyncrat
AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.
Read More
WarZone screenshot
WarZone
warzone avemaria stealer trojan rat
WarZone RAT is a remote access trojan, which is written in C++ and offered as a malware-as-a-service. It packs a wide range of capabilities, from stealing victims’ files and passwords to capturing desktop activities. WarZone RAT is primarily distributed via phishing emails and receives regular updates from its C2.
Read More

Our website uses cookies. By visiting the pages of the site, you agree to our Privacy Policy