General

  • Target

    random.exe

  • Size

    4.5MB

  • Sample

    250410-xcyf8azkt6

  • MD5

    d92ab77a1952b6cefd30bd521216e12f

  • SHA1

    3289f48221df3d918db2f08e2ba035b325adf4e2

  • SHA256

    beca3d277a7f44b1505566d3b15a0108fcdb38f47ec4deb571e9917ede8acf1b

  • SHA512

    38b3435ca141d02eb2ff50e959b16a99e4f79cc81f21454c13eaa8e111b150d326135037221948927fd2ce4f5fd440f2d7aa7d4f2da2797b9ceb5db3400c33df

  • SSDEEP

    98304:Zsi9Ky54MOVfvWyMkotqPb+BF8ySuU9Er3yvBqhyPCbqnnE2PF+Fld8x:am9jHkxCBmbEezCGnE2PF4v8

Malware Config

Extracted

Family

gcleaner

C2

185.156.73.98

45.91.200.135

Targets

    • Target

      random.exe

    • Size

      4.5MB

    • MD5

      d92ab77a1952b6cefd30bd521216e12f

    • SHA1

      3289f48221df3d918db2f08e2ba035b325adf4e2

    • SHA256

      beca3d277a7f44b1505566d3b15a0108fcdb38f47ec4deb571e9917ede8acf1b

    • SHA512

      38b3435ca141d02eb2ff50e959b16a99e4f79cc81f21454c13eaa8e111b150d326135037221948927fd2ce4f5fd440f2d7aa7d4f2da2797b9ceb5db3400c33df

    • SSDEEP

      98304:Zsi9Ky54MOVfvWyMkotqPb+BF8ySuU9Er3yvBqhyPCbqnnE2PF+Fld8x:am9jHkxCBmbEezCGnE2PF4v8

    • Detect Socks5Systemz Payload

    • GCleaner

      GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

    • Gcleaner family

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Socks5systemz family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v16

Tasks