General

  • Target

    60133213_random.exe

  • Size

    4.0MB

  • Sample

    250215-j2rs3sxkgm

  • MD5

    e3f24a5ee883f7e38a48e8d2a0b722a9

  • SHA1

    b9e51d4a06fb2d86c19279cbe966cf1314673ecb

  • SHA256

    ac171f04fdc8f6492ee9fa7d4928ac2a797481e844ed99a5b54c3403150fc4c4

  • SHA512

    df23859ee071e0328c325c091379bebf8bd68e68af5381a2315f158e27c153bae61c376255833774ad61b23464996e25c109aa2e590a97cf0ed72a3f8e27d65b

  • SSDEEP

    98304:Mlsl6iPFEN5ZF2D6U5HPmQ2QX3x8jwLvoslbVf1a:N6i9C22wmAQwLvoslbVfQ

Malware Config

Extracted

Family

gcleaner

C2

185.156.73.73

Targets

    • Target

      60133213_random.exe

    • Size

      4.0MB

    • MD5

      e3f24a5ee883f7e38a48e8d2a0b722a9

    • SHA1

      b9e51d4a06fb2d86c19279cbe966cf1314673ecb

    • SHA256

      ac171f04fdc8f6492ee9fa7d4928ac2a797481e844ed99a5b54c3403150fc4c4

    • SHA512

      df23859ee071e0328c325c091379bebf8bd68e68af5381a2315f158e27c153bae61c376255833774ad61b23464996e25c109aa2e590a97cf0ed72a3f8e27d65b

    • SSDEEP

      98304:Mlsl6iPFEN5ZF2D6U5HPmQ2QX3x8jwLvoslbVf1a:N6i9C22wmAQwLvoslbVfQ

    • GCleaner

      GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

    • Gcleaner family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks