General

  • Target

    a1d918c9253e2266f7f879a11367d143b52b0e6e65a754d82ff3efc747e8db61

  • Size

    1.8MB

  • Sample

    250126-bg1aqawng1

  • MD5

    1b58f7f01d1637314466c71853dcafc3

  • SHA1

    adc1e81925a937546751392af313a526d851393c

  • SHA256

    a1d918c9253e2266f7f879a11367d143b52b0e6e65a754d82ff3efc747e8db61

  • SHA512

    159c9702a50a045169d54b8ab7e5e692cdaf4e1469e2d0ff8ec84ac30e364aa0b8b77d51c483ac3431537eecb83eb21075c5ff489ea71efeb59ba6f88224baf4

  • SSDEEP

    24576:n+8UDrkTGh6ia9rb7ht9KNVDCfiiyxqQ8PrfY14B+mBENv29pPgZiXdhnD/Jiot:fmryhJb7hGMJ9PTsGEN+9pdhDp

Malware Config

Targets

    • Target

      a1d918c9253e2266f7f879a11367d143b52b0e6e65a754d82ff3efc747e8db61

    • Size

      1.8MB

    • MD5

      1b58f7f01d1637314466c71853dcafc3

    • SHA1

      adc1e81925a937546751392af313a526d851393c

    • SHA256

      a1d918c9253e2266f7f879a11367d143b52b0e6e65a754d82ff3efc747e8db61

    • SHA512

      159c9702a50a045169d54b8ab7e5e692cdaf4e1469e2d0ff8ec84ac30e364aa0b8b77d51c483ac3431537eecb83eb21075c5ff489ea71efeb59ba6f88224baf4

    • SSDEEP

      24576:n+8UDrkTGh6ia9rb7ht9KNVDCfiiyxqQ8PrfY14B+mBENv29pPgZiXdhnD/Jiot:fmryhJb7hGMJ9PTsGEN+9pdhDp

    • GCleaner

      GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

    • Gcleaner family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks