General

  • Target

    9afad313fdb3a41015ec415280986b4d596b1dc07bcc46b49f5bee6fcf5fb54c.exe

  • Size

    1.8MB

  • Sample

    241221-dc8gms1kbt

  • MD5

    4e341a5e65522dc7ad83bab52f3e60f8

  • SHA1

    d3a1d76710068d38cd35ed908c0677263f5d97e9

  • SHA256

    9afad313fdb3a41015ec415280986b4d596b1dc07bcc46b49f5bee6fcf5fb54c

  • SHA512

    27c41edded8e29f87be28bb93e86ae26129f28a63134235fa38493909bef08b2559b0da1bd03c4e2856b7cc6dbd2174650e7e3634f015e9f600f25bab4a4d3ac

  • SSDEEP

    49152:rTMq5MIQ0Tqibh61R5agdp707srnnouWcbxdt+ogki:nMq5M3iwR5agdiSnnoybbt+J

Malware Config

Targets

    • Target

      9afad313fdb3a41015ec415280986b4d596b1dc07bcc46b49f5bee6fcf5fb54c.exe

    • Size

      1.8MB

    • MD5

      4e341a5e65522dc7ad83bab52f3e60f8

    • SHA1

      d3a1d76710068d38cd35ed908c0677263f5d97e9

    • SHA256

      9afad313fdb3a41015ec415280986b4d596b1dc07bcc46b49f5bee6fcf5fb54c

    • SHA512

      27c41edded8e29f87be28bb93e86ae26129f28a63134235fa38493909bef08b2559b0da1bd03c4e2856b7cc6dbd2174650e7e3634f015e9f600f25bab4a4d3ac

    • SSDEEP

      49152:rTMq5MIQ0Tqibh61R5agdp707srnnouWcbxdt+ogki:nMq5M3iwR5agdiSnnoybbt+J

    • GCleaner

      GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

    • Gcleaner family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks