This week, the SonicWall Capture Labs threat research team investigated a sample of GCleaner, a Themida-packed malware variant that downloads and drops additional malware, has C2, heavy anti-analysis/anti-VM, and evasion capabilities. GCleaner will also attempt to infect removable drives by encryption or to spread to other systems.
The main executable has a variety of markers to illustrate it is not a typical file. Depending on the file detector used, it will show up as either ‘unknown’ or ‘Themida-Packed’. The timestamp marks the creation date as 12-31-1969, and the file sections are misnamed or missing.
Through dynamic analysis, the main executable runs and performs checks for the following programs and processes, while sending network requests every three seconds:
Checks are also performed to ensure the malware isn’t running on a virtual machine by querying the following registry keys:
This API call for GetLastError is used against multiple threads that are created and the checks require the appropriate error codes from each thread; attempting to bypass results in the program immediately closing. Once checks complete, multiple files are dropped onto the system with one being run immediately:
Cleaner.lnk is created using IShellLink to act as a shell script to run Y-Cleaner.
A TCP connection is made to ‘185.56.73.23/add?substr=mixfour&s=three&sub=emp’ to establish C2 comms and download another file named ‘fuckingdllENCR[1].dll; this IP is located in Russia. This file is completely encoded and did not run during testing; it also has no detection signature and appears to require additional code or a decryption operation before becoming usable.
To ensure SonicWall customers are prepared for any exploitation that may occur due to this malware, the following signatures have been released:
Share This Article
An Article By
An Article By
Security News
Security News