General

  • Target

    random.exe

  • Size

    4.0MB

  • Sample

    250212-zpdnpaxqer

  • MD5

    6830a67f26a493032170a92a85cecd40

  • SHA1

    5e39c0ed03aa07922d74fe2bf36aed4d4c9b5d54

  • SHA256

    d2978cf015e612a06069d724fa93a8d398eb79c1d276fafd74aa7d0b4d88835d

  • SHA512

    4a02a6611ab6f4a5b5eb0ec0698fe2d3e8c54c4f119cf04499331fef5730d8a46a331add32710b156e8aaa36d2be74ba1a8ef47b3b7154e7b7a3dfac544d0d99

  • SSDEEP

    49152:FvLURhh5foXXpiO/1xVW/oDEIfiCUqlgPcbDcP4E5PNUwIocWMn/ePFDN+6XaH:FvKCXXpi6DhHUCgqDIFPCw15MmPFDov

Malware Config

Targets

    • Target

      random.exe

    • Size

      4.0MB

    • MD5

      6830a67f26a493032170a92a85cecd40

    • SHA1

      5e39c0ed03aa07922d74fe2bf36aed4d4c9b5d54

    • SHA256

      d2978cf015e612a06069d724fa93a8d398eb79c1d276fafd74aa7d0b4d88835d

    • SHA512

      4a02a6611ab6f4a5b5eb0ec0698fe2d3e8c54c4f119cf04499331fef5730d8a46a331add32710b156e8aaa36d2be74ba1a8ef47b3b7154e7b7a3dfac544d0d99

    • SSDEEP

      49152:FvLURhh5foXXpiO/1xVW/oDEIfiCUqlgPcbDcP4E5PNUwIocWMn/ePFDN+6XaH:FvKCXXpi6DhHUCgqDIFPCw15MmPFDov

    • GCleaner

      GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

    • Gcleaner family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks