General

  • Target

    4fa1ce39b5f29fdae146f1e6a5b120c39f0dc07a9a312a453f235221cde8328c

  • Size

    1.9MB

  • Sample

    250127-jybbxsynez

  • MD5

    afba61fad6890456661c035c83e5ff76

  • SHA1

    e8e2405e5b619b222b4605fb8857b6f932db8deb

  • SHA256

    4fa1ce39b5f29fdae146f1e6a5b120c39f0dc07a9a312a453f235221cde8328c

  • SHA512

    bf84a0bede5623bb70e98a76a8ba23e1c48eb9291b9e4991b750035071f45a2929b719f401ecfe7fb64ef3d9d70e41f174cd65f3fc63f760c235cb8ebf69c4ce

  • SSDEEP

    49152:F0FrJzukZeAAtBPrgzq+KIn6+mBzxCxUv5eJm3I17:uVJztZenhkzq+VnEzxCxOeJm3I7

Malware Config

Targets

    • Target

      4fa1ce39b5f29fdae146f1e6a5b120c39f0dc07a9a312a453f235221cde8328c

    • Size

      1.9MB

    • MD5

      afba61fad6890456661c035c83e5ff76

    • SHA1

      e8e2405e5b619b222b4605fb8857b6f932db8deb

    • SHA256

      4fa1ce39b5f29fdae146f1e6a5b120c39f0dc07a9a312a453f235221cde8328c

    • SHA512

      bf84a0bede5623bb70e98a76a8ba23e1c48eb9291b9e4991b750035071f45a2929b719f401ecfe7fb64ef3d9d70e41f174cd65f3fc63f760c235cb8ebf69c4ce

    • SSDEEP

      49152:F0FrJzukZeAAtBPrgzq+KIn6+mBzxCxUv5eJm3I17:uVJztZenhkzq+VnEzxCxOeJm3I7

    • GCleaner

      GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

    • Gcleaner family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks