General
-
Target
30c20b7d2d4147dfc2a0de7c4f33b05414cd63bf2522638e458c0dd50e128d6c
-
Size
1.8MB
-
Sample
250109-nbz4zsyjey
-
MD5
16fbfcbb5a8c5159d107236a541dbc0f
-
SHA1
89898cd5824a3058344313abcba3ce5d7f6be353
-
SHA256
30c20b7d2d4147dfc2a0de7c4f33b05414cd63bf2522638e458c0dd50e128d6c
-
SHA512
cde4c5d812a457a30e2bbd2a9fb622713c2b3ba118e732b8dbbafb1bb2acb09e795d93b0347800707c050d3733f86795e644578004bb37032632e44d3a0d0346
-
SSDEEP
49152:nwQph0/LvM2kRtNLv+cNK6HZLz/n5jMM35vR5y/Oo:O/LSF+cNK6VzTxP
Static task
static1
Behavioral task
behavioral1
Sample
30c20b7d2d4147dfc2a0de7c4f33b05414cd63bf2522638e458c0dd50e128d6c.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
30c20b7d2d4147dfc2a0de7c4f33b05414cd63bf2522638e458c0dd50e128d6c
-
Size
1.8MB
-
MD5
16fbfcbb5a8c5159d107236a541dbc0f
-
SHA1
89898cd5824a3058344313abcba3ce5d7f6be353
-
SHA256
30c20b7d2d4147dfc2a0de7c4f33b05414cd63bf2522638e458c0dd50e128d6c
-
SHA512
cde4c5d812a457a30e2bbd2a9fb622713c2b3ba118e732b8dbbafb1bb2acb09e795d93b0347800707c050d3733f86795e644578004bb37032632e44d3a0d0346
-
SSDEEP
49152:nwQph0/LvM2kRtNLv+cNK6HZLz/n5jMM35vR5y/Oo:O/LSF+cNK6VzTxP
-
Gcleaner family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-