General

  • Target

    000b8aabf249b098debf5272810ca2dda8e48f001da966ba8323dc1b3d8d0b39.zip

  • Size

    4.1MB

  • Sample

    250211-wdtnzsvnc1

  • MD5

    916fb7c8e9326ff739d53f3afb29a40b

  • SHA1

    7bb6ab6b875bb7515b1aef8b805c9870a47bf9ae

  • SHA256

    6e648b78c174cef6945b9fef90fd53a7aaff0b6750e9031f1548869f48d20470

  • SHA512

    cc95e16cef3da4f53b93579a190cc0b4e20f037668caa92470c3700ef0fbd165d7badace78f079848690769688d8f1bf1f08e144ecb7257a6b52c2e450d275c6

  • SSDEEP

    98304:Qh5gmDUzC207+7J/xkN1NE/1qyU4PU42PCi4j2s2ifRl:8RDUp0S7igDx2PiKoZl

Malware Config

Extracted

Family

gcleaner

C2

185.156.73.73

Targets

    • Target

      000b8aabf249b098debf5272810ca2dda8e48f001da966ba8323dc1b3d8d0b39.exe

    • Size

      4.1MB

    • MD5

      74075a1f3749894c3feaced189e5212a

    • SHA1

      904ee457c526dcd3243353ddcc41635288653a32

    • SHA256

      000b8aabf249b098debf5272810ca2dda8e48f001da966ba8323dc1b3d8d0b39

    • SHA512

      035f99e1fd39a06e07da81b51587c11f7a758c50b2bf615d0b7b69dbeba1f0bc027e1995c05f4f39e556c648225faa1a769caf618e5846a5c103dc4d07f8e2b5

    • SSDEEP

      98304:STEXVUj7b8BS2EhLrUiYDdlVEoDX/WY/rayxR:STKi4dkUjDdfR/W8

    • GCleaner

      GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

    • Gcleaner family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks