General
-
Target
trainerv_pwba4pl5.exe
-
Size
3.7MB
-
Sample
230410-blff4sec57
-
MD5
f5ea08bdc47bf84ef2ee53ee85c2d976
-
SHA1
681925e9a3853a138cc66f4aa09e3f09d6eff7d1
-
SHA256
906d9e1b735cb0e4f4be5caf05656be681717f430a818902b1894a28f9375bbc
-
SHA512
4bbdb5af8fdbbf9ae9f014ea9977dcccb32ad10d071196a1b5fa4abdd1c8d9310fdc885ce85692c5f70c098d60dbe43290f3e9a1dcc1f6d759187e35cf17599a
-
SSDEEP
98304:fGOh3G3ggxc1hbBBPkA567hgci1NaWKoZXkNNxxaYxoDXcW:UwgmhLp67+zDDa3HaA6XcW
Static task
static1
Malware Config
Extracted
gcleaner
85.31.45.39
85.31.45.250
85.31.45.251
85.31.45.88
Targets
-
-
Target
trainerv_pwba4pl5.exe
-
Size
3.7MB
-
MD5
f5ea08bdc47bf84ef2ee53ee85c2d976
-
SHA1
681925e9a3853a138cc66f4aa09e3f09d6eff7d1
-
SHA256
906d9e1b735cb0e4f4be5caf05656be681717f430a818902b1894a28f9375bbc
-
SHA512
4bbdb5af8fdbbf9ae9f014ea9977dcccb32ad10d071196a1b5fa4abdd1c8d9310fdc885ce85692c5f70c098d60dbe43290f3e9a1dcc1f6d759187e35cf17599a
-
SSDEEP
98304:fGOh3G3ggxc1hbBBPkA567hgci1NaWKoZXkNNxxaYxoDXcW:UwgmhLp67+zDDa3HaA6XcW
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks for any installed AV software in registry
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-