Privateloader

Privateloader is changing its behavior trying to evade detection and sandbox detonations. I’ve been observing this in the recent days and its time to update rules.

A common detonation since this day is something like this:

Analysis https://consciencepropre.com/wp-content/uploads/release_09.rar Malicious activity - Interactive analysis ANY.RUN

Build gets to /tracemap.php and then communicates with /firegate.php in order to load executables.
ET rule “ET MALWARE Win32/BeamWinHTTP CnC Activity M2 (GET)” was helping to detect privateloader related traffic.

At December 20th, this behavior changed and now Privateloader builds gets to /bing_release.php and then communicates with /flash.php in order to load executables. Please note the sandbox detection by this priavteloader builds and the drop in the executables being load.

Examples on new behavior:
Analysis https://akaktif.com/server/release.rar Malicious activity - Interactive analysis ANY.RUN
Analysis https://pablomirandaarquitecto.cl/wp-upload/setup.rar?ee=file.zip Malicious activity - Interactive analysis ANY.RUN
Analysis https://acsship.com/server/release.rar Malicious activity - Interactive analysis ANY.RUN
MITM
Analysis https://bytebreez.com/wp/setup.rar Malicious activity - Interactive analysis ANY.RUN

It is need an update on ET rules in order to detect this new communications between privateloader builds and c2s (because there is currently no detection).

Thank you!

1 Like

Thanks for the heads up on this! It seems this is quite a rabbit hole, will see what we can come up with for coverage.

JT

2049837 - ET MALWARE Suspected PrivateLoader Activity (POST)

Went out today, if/when we see some hits on that sig we can remove the Suspected or otherwise update it based on what we are seeing.

JT

1 Like

Hello, Privateloader now has made a radical change update in its network behaviour

New behaviour: Analysis https://dataprotectioncourse.com/idm+download+with+crack+64+bit+2023.zip Malicious activity - Interactive analysis ANY.RUN
Last tipically privateloader detonation available on me: Analysis https://dealcatalogue.com/idm+download+with+crack+64+bit+2023.zip Malicious activity - Interactive analysis ANY.RUN

new c2s now using port 3306 to communicate between build and c2 host, please see attached detonation focusing on PID 5356 on the new behaviour

There is interaction between c2 and host and then a encrypted string where the configuration is received from c2 host and then the load of malware is done

Both builds used in detonations were grabbed from the same malvertising ad networks used by InstallsKey PPI service, known for years and should be no problem associating the source of both builds to the same origin

There is no rule detection of this new Privateloader behavior. The old behavior has not been observed since October 5th, some old c2s were destroyed or traditional files inside them were deleted (making them obsolete). So there should be no more questions about associating this new malware behavior to traditional Privateloader builds.

1 Like

Hey fella,

I took a look at the new Privateloader run, and compared it to another run I found on any.run, that looks like it was your doing :slight_smile:

I noticed on the 3306 communications that the infected client usually initiates the communications, and in both of these runs, the first bit of traffic is a 14 byte packet that, aside from the final 2 bytes, seems to have a 12-byte pattern that is consistent with the new privateloader run you shared in the post above. So for now, I’m using that to create a signature:

alert tcp-pkt $EXTERNAL_NET 3306 -> $HOME_NET any (msg:"ET MALWARE Suspected PrivateLoader CnC Checkin - Server Response"; flow:established,to_client; dsize:14; content:"|00 02 00 01 02 00 00 00 b6 00 00 00|"; fast_pattern; startswith; reference:url,community.emergingthreats.net/t/privateloader/1226/5; sid:1; rev:1;)

This rule will be added to tonight’s rule release. Thank you for sharing your observations with us.

3 Likes

This is wonderful. Thank you for your work

yeah i use to tag with my nick the interesting detonations in anyrun :stuck_out_tongue:

I will share more observations if I see any change in the next days! (Trying to detonate privateloader builds in a daily basis)

2 Likes