General

  • Target

    d73ea54ac2e743506e71cd190a0944725a2db4d1dd32ee330346c0b66dc485f1

  • Size

    1.8MB

  • Sample

    250107-ktd3pawjcm

  • MD5

    ea6e85b8df6e30efa6b25dccfbb1ab29

  • SHA1

    a58ebb5191614dee35e4ab044817a6bdf53a1b2d

  • SHA256

    d73ea54ac2e743506e71cd190a0944725a2db4d1dd32ee330346c0b66dc485f1

  • SHA512

    d27253c541e1152ab8bbdc4c626e028d3e02386c40a7d12e3a0eb5983f368812d2d1e49f8c61826a735c4b0f610726ffcf0b6568df469b8f36a04f2ac6f5658d

  • SSDEEP

    24576:Sptp83jcj0Q3U+65fKNguROXPbwjwnMfr2u3xDVFMD93A5BrS8cwaJWWliztEw:SjK3jct6ENguQTwjwMfr2EaVsreWWli

Malware Config

Targets

    • Target

      d73ea54ac2e743506e71cd190a0944725a2db4d1dd32ee330346c0b66dc485f1

    • Size

      1.8MB

    • MD5

      ea6e85b8df6e30efa6b25dccfbb1ab29

    • SHA1

      a58ebb5191614dee35e4ab044817a6bdf53a1b2d

    • SHA256

      d73ea54ac2e743506e71cd190a0944725a2db4d1dd32ee330346c0b66dc485f1

    • SHA512

      d27253c541e1152ab8bbdc4c626e028d3e02386c40a7d12e3a0eb5983f368812d2d1e49f8c61826a735c4b0f610726ffcf0b6568df469b8f36a04f2ac6f5658d

    • SSDEEP

      24576:Sptp83jcj0Q3U+65fKNguROXPbwjwnMfr2u3xDVFMD93A5BrS8cwaJWWliztEw:SjK3jct6ENguQTwjwMfr2EaVsreWWli

    • GCleaner

      GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

    • Gcleaner family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks