General

  • Target

    9e4b4e07b6315a30325c2ecc2b4934c65a9353cfae1d3eac72bb118f6fe9a88f.exe

  • Size

    4.5MB

  • Sample

    250326-1rb4battgx

  • MD5

    8971a2c233cf8331b76b9ad57b7686b7

  • SHA1

    0ef9d1a524cd88a1563b016a25e32ca3cfa0b35e

  • SHA256

    9e4b4e07b6315a30325c2ecc2b4934c65a9353cfae1d3eac72bb118f6fe9a88f

  • SHA512

    2477e843624f214fe63eccc684bf84527aea33f5664754b044a98a733630e4f332d3e2b226a61199bf37f3bdf6e65b4fec9314079567052c9b7bf8a93d00b915

  • SSDEEP

    98304:GFchxsrSHuSqbzm9qeq1tOjavCHha+awPGcrnrefCzl:GFExO+1wy9qexavCBBa21rrefkl

Malware Config

Targets

    • Target

      9e4b4e07b6315a30325c2ecc2b4934c65a9353cfae1d3eac72bb118f6fe9a88f.exe

    • Size

      4.5MB

    • MD5

      8971a2c233cf8331b76b9ad57b7686b7

    • SHA1

      0ef9d1a524cd88a1563b016a25e32ca3cfa0b35e

    • SHA256

      9e4b4e07b6315a30325c2ecc2b4934c65a9353cfae1d3eac72bb118f6fe9a88f

    • SHA512

      2477e843624f214fe63eccc684bf84527aea33f5664754b044a98a733630e4f332d3e2b226a61199bf37f3bdf6e65b4fec9314079567052c9b7bf8a93d00b915

    • SSDEEP

      98304:GFchxsrSHuSqbzm9qeq1tOjavCHha+awPGcrnrefCzl:GFExO+1wy9qexavCBBa21rrefkl

    • GCleaner

      GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

    • Gcleaner family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks