BLACK FRIDAY: 2-for-1 offer NOVEMBER 20 - 26 See details

PrivateLoader

57
Global rank
23 infographic chevron month
Month rank
20 infographic chevron week
Week rank
734
IOCs

PrivateLoader is a malware family that is specifically created to infect computer systems and drop additional malicious programs. It operates using a pay-per-install business model, which means that the individuals behind it are paid for each instance of successful deployment of different types of harmful programs, including trojans, stealers, and other ransomware.

Loader
Type
ex-USSR
Origin
1 May, 2021
First seen
26 July, 2024
Last seen

How to analyze PrivateLoader with ANY.RUN

Type
ex-USSR
Origin
1 May, 2021
First seen
26 July, 2024
Last seen

IOCs

IP addresses
190.219.153.101
79.137.205.112
104.47.53.36
193.106.175.148
104.26.8.139
31.210.20.251
181.63.252.68
77.28.83.241
179.26.198.190
20.255.200.185
104.21.44.192
185.82.216.64
187.251.132.139
187.147.209.115
190.103.205.174
79.137.202.224
95.111.233.125
193.56.146.5
195.96.151.46
116.202.116.61
Hashes
04fd3794814871b31fef000b51e51b6c20ad7646b3c74a585a668f95cf14fa06
2157d146a890d32c5ba49f31fa1840e5b0d56e4dd0bbf5f8b14cc4e482a47bef
bbfe892212b563f55273825e83c4e719e3fd408fdc609760223d1ca501f1e3eb
4e998800b102360f87df8e0d379ace3ba4981f8fc158f1c88c30f494463994a5
5ba0ccd452965cabb28e7b0a962af0431c4dae6c64ef3aa9163d36dc095dd442
249c5999fed16005d30c9a19d31bfedbe87fdada2d8b5a8bd6774544a0872d21
56a337b72603f3c64d01687525a5159b7e6ca99e1218fceee30e4add7062995b
c07572117f9dda3d61518694a205940da38d6d0baef87df01deacdefefe6fd81
e262e47a76916a2f919373cd4ba175953e9a81687ea27e03c4d5e998b65ee9b4
6858af2688d2e14af2f506e8a268045e38a9ee1a69759ded34c506c112910958
322816639967861f9e4df4debbe8ada63ecc8c22200bb4a956875d7a7dcd65f1
f5c67fe00b4cbee07d5e394c87f0c6224bbd841a92151d04841f584d56e58b0c
4508befe4b8012035c52c7aaccbe89b9f75919bdcc86feb8fe79ae01fdea8179
592412dd24c6b0efa7e2a0b4b6292e83f6d27652a9e4bb39b74e670323e5d735
d63069101832890712e5c2331af362d16737e667bac89c0e0476495f4cf81e9f
acdbcef3bcab8f9a42871c9d85702ab267995726d8874ba5b837c7dfe2222dad
b72c368feb2aead86c67ebb8eecc493806c1429f2ffe1833073fd1e93649f81b
08bbc669e529747d63a7b105e955034cc8f6af9665474865517340cdcad24e01
60fadef542af20618fb15f19df6dfa23aee36704b24550ea8250e31965a9046b
9f35bb451e3794d1c641e8814946ca28f4cb9366dd826482e3f8e04a07518c8d
Domains
kittyrecord.xyz
bebekmanti.com
beelowers.com
managespeedyuberinfo-program.info
recogniano.com
nebula.pm
230320051222585.btl.jbc75.shop
230224175748394.uba.xlf07.shop
managerefineduberinfo-program.info
cant.run
1qwqewrewqweqwrqe.sbs
bot.notmalware.top
livestream-ufc.com
vh567599.eurodir.ru
goupbuy.com
notmalware.top
maxximbrasil.com
haglove.stream
249b871ab7d2.info
lovletterstolife.store
URLs
http://109.120.176.203/api/twofish.php
http://109.120.176.203/api/crazyfish.php
http://77.105.133.27/api/twofish.php
http://77.105.133.27/download/th/space.php
http://77.105.133.27/download/123p.exe
http://77.105.133.27/api/crazyfish.php
http://85.192.56.26/api/bing_release.php
http://5.42.66.10/download/th/getimage12.php
http://5.42.66.10/api/bing_release.php
http://5.42.66.10/download/123p.exe
http://5.42.66.10/download/th/retail.php
http://5.42.66.10/download/th/space.php
http://85.192.56.26/api/flash.php
http://5.42.66.10/download/th/getimage15.php
http://5.42.66.10/api/flash.php
http://wfsdragon.ru/api/setStats.php
http://91.241.19.125/pub.php
http://sarfoods.com/index.php
http://db-ip.com/demo/home.php
http://discord.com/api/v9/users/@me
Last Seen at

Recent blog posts

post image
See Malicious Process Relationships on a Vis...
watchers 178
comments 0
post image
Brute Ratel C4 Badger Used to Load Latrodectu...
watchers 1013
comments 0
post image
Find Threats Exploiting CrowdStrike Outage w...
watchers 3000
comments 0

What is PrivateLoader malware?

PrivateLoader is a loader, which serves to embed other malware families on compromised systems. The creators of this malicious software, who are likely to be from ex-USSR countries, monetize their activity by charging various threat actors for the installation of their particular type of payload. The services are advertised openly on forums and Telegram channels, making them widely accessible.

The earliest instances of the malware’s activity can be traced to the beginning of 2021. However, researchers were able to spot it for the first time only in 2022, when it gained notoriety as the most widely used loader of the year.

A common vector of infection in the case of PrivateLoader has been through websites offering cracked versions of popular software. Once victims downloaded a file from such sites and ran an alleged software executable, they launched a chain reaction, which led to the installation of PrivateLoader and eventually to a trojan, stealer, or another type of malware being deployed on their system.

Some of the known malware families that have been pushed by PrivateLoader include Redline, DCRAT, Raccoon, and Smokeloader.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

Technical details of the PrivateLoader malicious software

PrivateLoader is written in C++ and has a control panel, allowing operators to manage its activity, including by adding new payload links and tracking the total number of installations.

PrivateLoader is set up to drop payloads depending on the configuration of each victim’s system. For instance, it can distribute malware based on the geo location. It can also scan the machine to determine if there are any crypto wallets installed and see banking credentials. Yet, in most cases, it does not exfiltrate this information.

PrivateLoader is a modular threat, consisting of three distinct parts, each with its own purpose. It starts with the Loader module, which is intended for downloading the main Core module. The latter then contacts the command-and-control server (C2) and drops the next-stage threat, as well as the Service module that is regularly updated and responsible for keeping the loader on the victim’s system. In certain instances, PrivateLoader can drop several payloads.

The malware also makes use of the Dead Drop Resolver technique, where it utilizes legitimate services, such as Discord, to host malicious payloads.

PrivateLoader employs various techniques to prevent analysis, including encrypting its important strings and obfuscating the C2 communication.

Execution process of PrivateLoader

Let’s see how PrivateLoader operates in detail by uploading its sample to ANY.RUN, an interactive sandbox for malware analysis.

The main PrivateLoader process creates a child process whose executable file is located in the user’s “Pictures” directory. The created child process is added to the startup using Task Scheduler. The executable file of the child process was downloaded from the Internet.

Analyzing the HTTP requests, we can observe connections and data exchanges with the C2 server. The content sent (as well as received) in POST requests consists of BASE64-encoded strings. Moving forward to the indicators, we can see that the malware steals user credentials from browsers.

Read a detailed analysis of PrivateLoader in our blog.

PrivateLoader process tree shown in ANY.RUN PrivateLoader’s process tree demonstrated in ANY.RUN

Distribution methods of the PrivateLoader malware

As mentioned above, the primary way PrivateLoader can infect a computer is via a direct download. Attackers employ SEO poisoning to boost the ranking of their websites. Users visit these links in search of different types of legitimate programs. Yet, after downloading an archive from the website and opening its contents, an infection begins, allowing PrivateLoader to compromise the entire system.

Conclusion

PrivateLoader is a serious threat to organizations and individuals because of the scale of its operation, as it can infect hundreds of thousands of computers in a short period of time. In order to avoid falling victim to this and other malware, it is vital to steer clear of suspicious websites and never download software from unofficial sources.

To determine whether a certain file or link is malicious, use ANY.RUN. It is a malware sandbox that provides users with the ability to interact with the samples at hand in a safe cloud environment. For instance, PrivateLoader usually comes packed into a passworded archive. ANY.RUN lets you easily open it, extract the contents, and run them as if you were using your own computer to expose any harmful behavior and collect IOCs.

Try ANY.RUN for free – request a demo!

HAVE A LOOK AT

Adwind screenshot
Adwind
adwind trojan
Adwind RAT, sometimes also called Unrecom, Sockrat, Frutas, jRat, and JSocket, is a Malware As A Service Remote Access Trojan that attackers can use to collect information from infected machines. It was one of the most popular RATs in the market in 2015.
Read More
Agent Tesla screenshot
Agent Tesla
agenttesla trojan rat stealer
Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.
Read More
Amadey screenshot
Amadey
amadey
Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks.
Read More
Arkei screenshot
Arkei
arkei stealer
Arkei is a stealer type malware capable of collecting passwords, autosaved forms, cryptocurrency wallet credentials, and files.
Read More
AsyncRAT screenshot
AsyncRAT
asyncrat
AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.
Read More
WarZone screenshot
WarZone
warzone avemaria stealer trojan rat
WarZone RAT is a remote access trojan, which is written in C++ and offered as a malware-as-a-service. It packs a wide range of capabilities, from stealing victims’ files and passwords to capturing desktop activities. WarZone RAT is primarily distributed via phishing emails and receives regular updates from its C2.
Read More