General
-
Target
random.exe
-
Size
4.5MB
-
Sample
250410-xcyf8azkt6
-
MD5
d92ab77a1952b6cefd30bd521216e12f
-
SHA1
3289f48221df3d918db2f08e2ba035b325adf4e2
-
SHA256
beca3d277a7f44b1505566d3b15a0108fcdb38f47ec4deb571e9917ede8acf1b
-
SHA512
38b3435ca141d02eb2ff50e959b16a99e4f79cc81f21454c13eaa8e111b150d326135037221948927fd2ce4f5fd440f2d7aa7d4f2da2797b9ceb5db3400c33df
-
SSDEEP
98304:Zsi9Ky54MOVfvWyMkotqPb+BF8ySuU9Er3yvBqhyPCbqnnE2PF+Fld8x:am9jHkxCBmbEezCGnE2PF4v8
Static task
static1
Behavioral task
behavioral1
Sample
random.exe
Resource
win10v2004-20250410-en
Malware Config
Extracted
gcleaner
185.156.73.98
45.91.200.135
Targets
-
-
Target
random.exe
-
Size
4.5MB
-
MD5
d92ab77a1952b6cefd30bd521216e12f
-
SHA1
3289f48221df3d918db2f08e2ba035b325adf4e2
-
SHA256
beca3d277a7f44b1505566d3b15a0108fcdb38f47ec4deb571e9917ede8acf1b
-
SHA512
38b3435ca141d02eb2ff50e959b16a99e4f79cc81f21454c13eaa8e111b150d326135037221948927fd2ce4f5fd440f2d7aa7d4f2da2797b9ceb5db3400c33df
-
SSDEEP
98304:Zsi9Ky54MOVfvWyMkotqPb+BF8ySuU9Er3yvBqhyPCbqnnE2PF+Fld8x:am9jHkxCBmbEezCGnE2PF4v8
-
Detect Socks5Systemz Payload
-
Gcleaner family
-
Socks5systemz family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-