General

  • Target

    GDLauncher__2.0.8__win__x64.exe

  • Size

    111.3MB

  • Sample

    240503-wvw6fafg59

  • MD5

    f631466f5bf6ae4cc85dfacadac1860c

  • SHA1

    6d5d68e07a02fe9bad3dc5a964957fa104e2c2dd

  • SHA256

    e8784b21f05c7f91ae6082ae912ddefddf62bccf717c2a9f649f147eb28eadbb

  • SHA512

    c8c602b4bfda26e848c13be051340c3d15bde20f9124cde45f0be25a5b178315a273c031cce8bf92f1ffe27141ca9b8885938a3ea9cac4fb36aa23e3525d2461

  • SSDEEP

    3145728:G1e4/oxfXnUMT8w4PAizShIsS3sclI879omN:34/YXhcPj6IsS8cGcrN

Malware Config

Targets

    • Target

      GDLauncher__2.0.8__win__x64.exe

    • Size

      111.3MB

    • MD5

      f631466f5bf6ae4cc85dfacadac1860c

    • SHA1

      6d5d68e07a02fe9bad3dc5a964957fa104e2c2dd

    • SHA256

      e8784b21f05c7f91ae6082ae912ddefddf62bccf717c2a9f649f147eb28eadbb

    • SHA512

      c8c602b4bfda26e848c13be051340c3d15bde20f9124cde45f0be25a5b178315a273c031cce8bf92f1ffe27141ca9b8885938a3ea9cac4fb36aa23e3525d2461

    • SSDEEP

      3145728:G1e4/oxfXnUMT8w4PAizShIsS3sclI879omN:34/YXhcPj6IsS8cGcrN

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops file in System32 directory

    • Target

      $PLUGINSDIR/SpiderBanner.dll

    • Size

      9KB

    • MD5

      17309e33b596ba3a5693b4d3e85cf8d7

    • SHA1

      7d361836cf53df42021c7f2b148aec9458818c01

    • SHA256

      996a259e53ca18b89ec36d038c40148957c978c0fd600a268497d4c92f882a93

    • SHA512

      1abac3ce4f2d5e4a635162e16cf9125e059ba1539f70086c2d71cd00d41a6e2a54d468e6f37792e55a822d7082fb388b8dfecc79b59226bbb047b7d28d44d298

    • SSDEEP

      192:5lkE3uqRI1y7/xcfK4PRef6gQzJyY1rpKlVrw:5lkMBI1y7UKcef6XzJrpKY

    Score
    1/10
    • Target

      $PLUGINSDIR/StdUtils.dll

    • Size

      100KB

    • MD5

      c6a6e03f77c313b267498515488c5740

    • SHA1

      3d49fc2784b9450962ed6b82b46e9c3c957d7c15

    • SHA256

      b72e9013a6204e9f01076dc38dabbf30870d44dfc66962adbf73619d4331601e

    • SHA512

      9870c5879f7b72836805088079ad5bbafcb59fc3d9127f2160d4ec3d6e88d3cc8ebe5a9f5d20a4720fe6407c1336ef10f33b2b9621bc587e930d4cbacf337803

    • SSDEEP

      3072:WNuZmJ9TDP3ahD2TF7Rq9cJNPhF9vyHf:WNuZ81zaAFHhF9v

    Score
    3/10
    • Target

      $PLUGINSDIR/System.dll

    • Size

      12KB

    • MD5

      0d7ad4f45dc6f5aa87f606d0331c6901

    • SHA1

      48df0911f0484cbe2a8cdd5362140b63c41ee457

    • SHA256

      3eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca

    • SHA512

      c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9

    • SSDEEP

      192:1enY0LWelt70elWjvfstJcVtwtYbjnIOg5AaDnbC7ypXhtIj:18PJlt70esj0Mt9vn6ay6

    Score
    3/10
    • Target

      $PLUGINSDIR/WinShell.dll

    • Size

      3KB

    • MD5

      1cc7c37b7e0c8cd8bf04b6cc283e1e56

    • SHA1

      0b9519763be6625bd5abce175dcc59c96d100d4c

    • SHA256

      9be85b986ea66a6997dde658abe82b3147ed2a1a3dcb784bb5176f41d22815a6

    • SHA512

      7acf7f8e68aa6066b59ca9f2ae2e67997e6b347bc08eb788d2a119b3295c844b5b9606757168e8d2fbd61c2cda367bf80e9e48c9a52c28d5a7a00464bfd2048f

    Score
    3/10
    • Target

      GDLauncher.exe

    • Size

      169.9MB

    • MD5

      52b6403f53e1ada74df7084129952d0d

    • SHA1

      ea11febd4cbb09544b088aec2c6ffa2b42f83959

    • SHA256

      a8735f79159bdfed49768d007be08f60a8e4b2c28327c384e2e0f80ce5b6e7cf

    • SHA512

      197253a33c7a72b1adac0becf6e3bb5e5385f2ee96aab01d377d7ad0ea96c09a69436e38e57e2196be4f348e63be873ba0c90194f0ced3263c730bf5880bfaa2

    • SSDEEP

      1572864:bs+fxQiW1vVzbHpUcEtmLd7cF3PPHNzLuTe7ulsxM/Gyr/w7VoB4X+x2CFRXQQS+:ee8BWNg3DFxf1

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops file in System32 directory

    • Target

      LICENSES.chromium.html

    • Size

      8.7MB

    • MD5

      fcb299831276a7c8bdeb036142da1c25

    • SHA1

      bf6990abb92ab627b7f2e7aecbd5a58b86d2e09a

    • SHA256

      6daa3cd398e5380222c6b6bdb4d66a4b4273d4bb74d6bf53495a5722f03ac0dc

    • SHA512

      1e31ac0b6836d24488e32d04b5028ac2a9e00ebd8e29aaf742d9e0cdb50d5a9d4f7bcc3919b22a793552d31aaed2104415268f14e903754bf25a86510fbc98c9

    • SSDEEP

      24576:RQQa6NA6P5dWWSmwRFXe1vmfpV6k626D6b62vCuApj:RWfTF0

    Score
    1/10
    • Target

      d3dcompiler_47.dll

    • Size

      4.7MB

    • MD5

      f59294d4012d69b80205b8e1830a5a7c

    • SHA1

      34d3a480f6799cf904aba944511383f31c24d3ea

    • SHA256

      c15d5cadfaa022c6cf37ed34a81e2f2e7cdca1b8e017a2576702e9fa80b03e75

    • SHA512

      909c4598adf539d685e0ceeac7aa64dfd6c765eacc0392d1f5c48d2bb26154f973c1c499bf69c07c502244a5694611ef06d0e634ff09a4140321638e9f1e45b5

    • SSDEEP

      49152:uCZnRO4XyM53Rkq4ypQqdoRpmruVNYvkaRwvhiD0N+YEzI4og/RfzHLeHTRhFRN6:9G2QCwmHPnog/pzHAo/A6v

    Score
    1/10
    • Target

      ffmpeg.dll

    • Size

      2.8MB

    • MD5

      3a874fa432f621b517c8c562fdb3e150

    • SHA1

      6b43833ca5ec931824086cecb878a83aef0bde9f

    • SHA256

      87eea23eafd23fe15a500827cb1a8724abcde2b711737b5ee12a038ebd9a0176

    • SHA512

      2953eb4cc66bd2089a67f138e95810d494e4b826be4b79227936c625809589259a63e19adcb9be8e2d90ffed31f9ca0f18324669de783a6ec7255e94a1637f81

    • SSDEEP

      49152:5PDtyvMYqXiOamQ7NyjmnMDbG7OUx7n6mfu/oB7pweIcgsxqeUsn/uL:9SOqNIoQG7OUrd/xKsn/uL

    Score
    1/10
    • Target

      libEGL.dll

    • Size

      477KB

    • MD5

      9961be7be92a37f982a586a1b5893a72

    • SHA1

      301abdd2226e5369e02ef0fc54358cd9069657f7

    • SHA256

      d9b7daf09b891407f5fa0a406853d370a654cb145a11012195be33ee616c1acd

    • SHA512

      7fa6f83203bd92b7e525940e9deed8968c5dd4dec7c82192acd1ba239c0b1686050dd294eb6a08439e6a81f019b77cd2d17679383a6628b795671e98a21a1d2a

    • SSDEEP

      6144:3uF2DwTNCKxOUxcfDVTyKH/VbPGtWQAOWIBtuKYbu7DB0:+DCKsAcfDVjktWQAOWIubgO

    Score
    1/10
    • Target

      libGLESv2.dll

    • Size

      7.5MB

    • MD5

      2718694e3a8b2ba7ac7ef71c7a0ef4aa

    • SHA1

      7ba04084be9d853c7c4f835a7f714425794c3523

    • SHA256

      ae39ba9c938a17b90445fdaaa184e710ea405e21784a6cc9caa10320a49c6cfd

    • SHA512

      2e1594506ecd3035f31e134eaa2eeb1d98b12f0917f0dd153bbb8a6931d4438bdaae7d96770c1c1aeef9af4bfaae3af524fb9ea6c2f785530f579d12d70256dc

    • SSDEEP

      98304:qYM1bKnyhXV3X4Nf/eW74heor1up6sDCpaXm3TVZ:qL1jlX4F7ivuyUCTVZ

    Score
    1/10
    • Target

      owutility.dll

    • Size

      1.5MB

    • MD5

      651be77b72f07779b26f2e2df4c95324

    • SHA1

      3285a850ff632659cebfd3be8e3e65730b483b1d

    • SHA256

      9ce3065cdc8b581a4dc33ebc98f6ea98933e75b87e262834c21c46dfb3bd5048

    • SHA512

      020ca2db9147df510013beb6fb0ab1b8cf491e5505d2040c35f66c29b8858dd787361dd092a2b13c817eebae57690a9020f5da310452a4c21762826d2fe758a9

    • SSDEEP

      24576:mjjAyN7CbTB3Iu2VIMiFryCF9fLp34G5cdHSdslQ3m3oGch+XaxLaXp/:mjcyNeR3IuUIMiFLFpLp3z5cdgsvYFhU

    Score
    1/10
    • Target

      resources/app.asar.unpacked/node_modules/@sentry/cli-win32-x64/bin/sentry-cli.exe

    • Size

      7.3MB

    • MD5

      2fbcfe6059c7faaad6dadb56992f7996

    • SHA1

      1a0326c6d0740de9035bc8899e4a249189f01c3b

    • SHA256

      9f2ac1933960708f89817cdc7898074563f796713b0bb94f5eadbc832dc31189

    • SHA512

      64939837ec34b39a3b31d8e424229e1e408c7a6448bd02a11e755e17c74edb6a582165e6e0ab6fa504c7cbb25f69095ba72ad84dc435026d0ebdbf73d475c0c6

    • SSDEEP

      98304:ZK/JXOfs1oY6qWAIhUzgtDZhyfstGwAxDujtC3wdHErg7eYSG8G+Po:M/O/5DZteZu2wdHErgURG+Po

    Score
    1/10
    • Target

      resources/binaries/core_module.exe

    • Size

      26.1MB

    • MD5

      5427ce634d9d9ea2fe94ce0c947124f5

    • SHA1

      5e693b9c95a829ce6c6d1b0152b370fa3ddf92fa

    • SHA256

      e4291191bc1dd8f60310694869fd9437710f3059ac726377a07fadf9bce70e9f

    • SHA512

      cf5f1e59f12fe2db60bd056ab60da9db8fe28852656a60df9a75767fae3b6ebca1c505cf13bcf2b3bd78e0f2ad8a2842103d83c9588de7097665d206237548d9

    • SSDEEP

      196608:zOo6/vkrmIP7/5W542YFsaHHR6f32qzQ01QCoU:ZcYP7/CMA32qmQ

    Score
    5/10
    • Drops file in System32 directory

    • Target

      resources/elevate.exe

    • Size

      115KB

    • MD5

      94faad96bcc3c1e083b57eb67b7eb92b

    • SHA1

      521bc7befd021086ee1dcc8a33d5358eb81281ff

    • SHA256

      a55770be41bb05c4b422b53defc4a36d2fd5dede970eb199625ad4c1efb37c3f

    • SHA512

      7433fbd9ea712fdaad2b144c6aeb70bcf537545c64f4c3a27098cb5bd833ef3712a206711fe1244b1e9c5b2e358ecd53e30462af18afa563d4de222e12f1f568

    • SSDEEP

      3072:/abLnrwQoRDtdMMgSXiFJWcIgUVCfRjV/GrWl/X:SPrwRhte1XsE1lf

    Score
    1/10
    • Target

      vk_swiftshader.dll

    • Size

      5.0MB

    • MD5

      97f3eb7a38e6e9ec6757f320170d6171

    • SHA1

      38f3165cb5243b38c33c34d88171f8a5f5668221

    • SHA256

      79d822c157881b46c1136b14fd5164da9c528f0b1f2f0cc5ceed4b5fd4060c9f

    • SHA512

      ca3d6dd07b848a045fc8976c058a01ce6ecf8ac0f2e121531435906ab66610fdd574fd1125dce4cc2a2f884000f32b54604a6b67f708c0feb14fff1291ab6996

    • SSDEEP

      49152:OO6ftEjL3Zdon2+a/EgBqB1y91lxfAV7xWV9cO6NZ8m8xg1drRXmVEZvMUn0Hjyw:OLftlUSot6EmXxZdIOl5bzLB3dIWY

    Score
    1/10
    • Target

      vulkan-1.dll

    • Size

      935KB

    • MD5

      d8bbc2f245dfae4094db4b9ce77bc3af

    • SHA1

      654efbff9894120f6f1030a47a96074c838e88a9

    • SHA256

      56d3cc80ca50f32cedf0a720d6bfc38647566e39630e1907d76e3995e4651492

    • SHA512

      7ba6322b23e987f7908dae01fc277c5573bd85e219afb330fe2de1b7be281febf9908ad21957c0600f2b1d4a7aec7f00e54ec22d59b95ba573a6b077daf7b24f

    • SSDEEP

      24576:zy+lCO+5ian96u6WbEJXay6Z5WdDYsH26g3P0zAk7o3uk:zymViaWbYT6Z5WdDYsH26g3P0zAk7ot

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks

static1

Score
3/10

behavioral1

discovery
Score
4/10

behavioral2

discoveryexecutionspywarestealer
Score
7/10

behavioral3

Score
1/10

behavioral4

Score
1/10

behavioral5

Score
3/10

behavioral6

Score
3/10

behavioral7

Score
3/10

behavioral8

Score
3/10

behavioral9

Score
3/10

behavioral10

Score
3/10

behavioral11

Score
1/10

behavioral12

discoveryexecutionspywarestealer
Score
7/10

behavioral13

Score
1/10

behavioral14

Score
1/10

behavioral15

Score
1/10

behavioral16

Score
1/10

behavioral17

Score
1/10

behavioral18

Score
1/10

behavioral19

Score
1/10

behavioral20

Score
1/10

behavioral21

Score
1/10

behavioral22

Score
1/10

behavioral23

Score
1/10

behavioral24

Score
1/10

behavioral25

Score
1/10

behavioral26

Score
1/10

behavioral27

Score
5/10

behavioral28

Score
1/10

behavioral29

Score
1/10

behavioral30

Score
1/10

behavioral31

Score
1/10

behavioral32

Score
1/10

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.