General
-
Target
cf87202970d8178471d134316b9c6b2271c6e7f4e22e880783ace601bbb9d328
-
Size
1.8MB
-
Sample
241226-ptk88awkfq
-
MD5
819ebd4f3f552248bef6bb50332da732
-
SHA1
651b2f9f28ad27c6d1a1289bbd29d65f7fa811f9
-
SHA256
cf87202970d8178471d134316b9c6b2271c6e7f4e22e880783ace601bbb9d328
-
SHA512
cac820d548379566311ff90babd964eed03adaf5cb5f6d0baffa9701b0c44dbd9dfa106e2e0f0d68f40d428a751859d05e372ee231a0ada85d99be69280d8dde
-
SSDEEP
49152:+RBYx3M5gZDM7LeN9tBuYMoYpMyfPxUvT/0WzMiu0bN3:6B6CPkU1ayfPxUTjM52N
Static task
static1
Behavioral task
behavioral1
Sample
cf87202970d8178471d134316b9c6b2271c6e7f4e22e880783ace601bbb9d328.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
cf87202970d8178471d134316b9c6b2271c6e7f4e22e880783ace601bbb9d328
-
Size
1.8MB
-
MD5
819ebd4f3f552248bef6bb50332da732
-
SHA1
651b2f9f28ad27c6d1a1289bbd29d65f7fa811f9
-
SHA256
cf87202970d8178471d134316b9c6b2271c6e7f4e22e880783ace601bbb9d328
-
SHA512
cac820d548379566311ff90babd964eed03adaf5cb5f6d0baffa9701b0c44dbd9dfa106e2e0f0d68f40d428a751859d05e372ee231a0ada85d99be69280d8dde
-
SSDEEP
49152:+RBYx3M5gZDM7LeN9tBuYMoYpMyfPxUvT/0WzMiu0bN3:6B6CPkU1ayfPxUTjM52N
-
Gcleaner family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-