General

  • Target

    b9a0851bbb3ed476b114ea6f18fa7de092e0a4e3c8b594e07799c32e56157fca

  • Size

    1.9MB

  • Sample

    250126-n7qv7askdn

  • MD5

    19d00d901034e6f159fd92037d4642e6

  • SHA1

    1bd2dca7c6bcfa72933f2d156b08206eecf0e74d

  • SHA256

    b9a0851bbb3ed476b114ea6f18fa7de092e0a4e3c8b594e07799c32e56157fca

  • SHA512

    a527fa038f981e826b1469c403c7f1dad1b4116f60e2a66174de4647d083c586530e4b989aef72d58928bc24403e0fcce2040e3b932cddf634628b3d6f0a498f

  • SSDEEP

    49152:Tkq+xKsAz4UsIEZcMAk+Ayl/kXtGvxu6LdrXiXd9ZR6/uFVIcGx:gHKsAzWVcMT+96dGZu6J7ibfFo

Malware Config

Targets

    • Target

      b9a0851bbb3ed476b114ea6f18fa7de092e0a4e3c8b594e07799c32e56157fca

    • Size

      1.9MB

    • MD5

      19d00d901034e6f159fd92037d4642e6

    • SHA1

      1bd2dca7c6bcfa72933f2d156b08206eecf0e74d

    • SHA256

      b9a0851bbb3ed476b114ea6f18fa7de092e0a4e3c8b594e07799c32e56157fca

    • SHA512

      a527fa038f981e826b1469c403c7f1dad1b4116f60e2a66174de4647d083c586530e4b989aef72d58928bc24403e0fcce2040e3b932cddf634628b3d6f0a498f

    • SSDEEP

      49152:Tkq+xKsAz4UsIEZcMAk+Ayl/kXtGvxu6LdrXiXd9ZR6/uFVIcGx:gHKsAzWVcMT+96dGZu6J7ibfFo

    • GCleaner

      GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

    • Gcleaner family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks