General
-
Target
4463effeb9799edfe6c07776f1e044718792fabb6ea103b9ee016e5efd21a985.exe
-
Size
1.8MB
-
Sample
241221-cwgbts1jbj
-
MD5
3c2e26d10fa55af2e913120df3b7eddb
-
SHA1
a6ba8c6378d44616d7196331c6ea54e286136ce6
-
SHA256
4463effeb9799edfe6c07776f1e044718792fabb6ea103b9ee016e5efd21a985
-
SHA512
be0d54efddd550dd9acc996df86ff2dc86a8fb50aa84e7d018736d16e06a97c746c2a3b92f70b56773fa791fe3b6ba365d676ed7683cd8f82738b2743d2a82c6
-
SSDEEP
49152:kA8icQ8TAFCy7gjmjVD6Gd1R6ESxZ9MswgY+YP7Mnr:YNFyM4VmIDS39MrGk7M
Static task
static1
Behavioral task
behavioral1
Sample
4463effeb9799edfe6c07776f1e044718792fabb6ea103b9ee016e5efd21a985.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
4463effeb9799edfe6c07776f1e044718792fabb6ea103b9ee016e5efd21a985.exe
-
Size
1.8MB
-
MD5
3c2e26d10fa55af2e913120df3b7eddb
-
SHA1
a6ba8c6378d44616d7196331c6ea54e286136ce6
-
SHA256
4463effeb9799edfe6c07776f1e044718792fabb6ea103b9ee016e5efd21a985
-
SHA512
be0d54efddd550dd9acc996df86ff2dc86a8fb50aa84e7d018736d16e06a97c746c2a3b92f70b56773fa791fe3b6ba365d676ed7683cd8f82738b2743d2a82c6
-
SSDEEP
49152:kA8icQ8TAFCy7gjmjVD6Gd1R6ESxZ9MswgY+YP7Mnr:YNFyM4VmIDS39MrGk7M
-
Gcleaner family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-