General

  • Target

    a8f98112b9ae05da6d4768ba8376f8a816b5d80cb1b497b873e8c26f9430f05b.exe

  • Size

    4.5MB

  • Sample

    250327-anfzzsxlz3

  • MD5

    064b2be32919cb0fbf3167406d1ee84a

  • SHA1

    461f8fc65a2ae9813a74a0c955f24d123182d49a

  • SHA256

    a8f98112b9ae05da6d4768ba8376f8a816b5d80cb1b497b873e8c26f9430f05b

  • SHA512

    8502cee347e2a005037b581522c820df782832999d49ef9319d40e9e4af4200db9f5aa8b2792957365f89253700c0e33b6e1b80802e9c12c147cecca64003a1e

  • SSDEEP

    98304:aF8C/FXNJBbqk0KsZqxtp2XosxlCdumexOQvPjLZgVsxIYJnXsN:OR/FLVqKsZqoXoAlzxXvbft

Malware Config

Targets

    • Target

      a8f98112b9ae05da6d4768ba8376f8a816b5d80cb1b497b873e8c26f9430f05b.exe

    • Size

      4.5MB

    • MD5

      064b2be32919cb0fbf3167406d1ee84a

    • SHA1

      461f8fc65a2ae9813a74a0c955f24d123182d49a

    • SHA256

      a8f98112b9ae05da6d4768ba8376f8a816b5d80cb1b497b873e8c26f9430f05b

    • SHA512

      8502cee347e2a005037b581522c820df782832999d49ef9319d40e9e4af4200db9f5aa8b2792957365f89253700c0e33b6e1b80802e9c12c147cecca64003a1e

    • SSDEEP

      98304:aF8C/FXNJBbqk0KsZqxtp2XosxlCdumexOQvPjLZgVsxIYJnXsN:OR/FLVqKsZqoXoAlzxXvbft

    • GCleaner

      GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

    • Gcleaner family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks