MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 001a5a474bbbd8f905626617e612861e7f1de5286b009960c0deefbf06508723. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
GCleaner
Vendor detections: 13
| SHA256 hash: | 001a5a474bbbd8f905626617e612861e7f1de5286b009960c0deefbf06508723 |
|---|---|
| SHA3-384 hash: | 9cd9864797a93e842bcbc0bfd64c6ca577c1e5f968534977132853712452f15e82178eefb30d6c6b81646e3e7b574434 |
| SHA1 hash: | afb5b26b9409cf228e12bfa3f4a63c64ca9949cb |
| MD5 hash: | b38f807fc02e26c295c37f41f448352e |
| humanhash: | summer-lion-eleven-romeo |
| File name: | b38f807fc02e26c295c37f41f448352e.exe |
| Download: | download sample |
| Signature | GCleaner |
| File size: | 7'263'053 bytes |
| First seen: | 2022-01-30 06:46:23 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 101 x GuLoader, 64 x DiamondFox) |
| ssdeep | 196608:J/CTEC8IEE4pW73zw5pG3PwrA1wkNK0fsZkcG1VUA8m83xj4DE0:J/11hW73zw56IIwkNfUZ7GX38mexr0 |
| Threatray | 1'365 similar samples on MalwareBazaar |
| TLSH | T1A57633F667429F51E7EE6972816F90060471FA079A82F21A4F3A145F22476F4FB12F32 |
| File icon (PE): | |
| dhash icon | b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla) |
| Reporter | |
| Tags: | exe gcleaner |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| 157.90.17.156:56409 | https://threatfox.abuse.ch/ioc/366514/ |
| 92.255.57.115:11841 | https://threatfox.abuse.ch/ioc/366527/ |
Intelligence
File Origin
# of uploads :
1
# of downloads :
243
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
b38f807fc02e26c295c37f41f448352e.exe
Verdict:
No threats detected
Analysis date:
2022-01-30 06:56:54 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
DLInjector04
Result
Verdict:
Malware
Maliciousness:
Behaviour
Searching for the window
Creating a file in the %temp% directory
Сreating synchronization primitives
Creating a process from a recently created file
Creating a file
Running batch commands
Sending a custom TCP request
DNS request
Sending an HTTP GET request
Launching a process
Searching for synchronization primitives
Creating a window
Searching for analyzing tools
Creating a process with a hidden window
Launching the default Windows debugger (dwwin.exe)
Launching cmd.exe command interpreter
Unauthorized injection to a recently created process
Result
Malware family:
n/a
Score:
5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
Likely Malicious
Threat level:
7.5/10
Confidence:
100%
Tags:
control.exe overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Socelars
Verdict:
Malicious
Result
Threat name:
RedLine SmokeLoader Socelars onlyLogger
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates processes via WMI
Disables Windows Defender (via service or powershell)
Hides threads from debuggers
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
PE file has nameless sections
Performs DNS queries to domains with low reputation
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to evade analysis by execution special instruction which cause usermode exception
Yara detected Generic Downloader
Yara detected onlyLogger
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Socelars
Yara Genericmalware
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.SmallDownloader
Status:
Malicious
First seen:
2022-01-28 09:55:23 UTC
File Type:
PE (Exe)
Extracted files:
382
AV detection:
30 of 43 (69.77%)
Threat level:
5/5
Detection(s):
Malicious file
Verdict:
malicious
Similar samples:
+ 1'355 additional samples on MalwareBazaar
Result
Malware family:
socelars
Score:
10/10
Tags:
family:onlylogger family:redline family:smokeloader family:socelars botnet:20kprofessor2 botnet:buildnewmast botnet:media262231 aspackv2 backdoor discovery infostealer loader persistence spyware stealer trojan upx
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Delays execution with timeout.exe
Enumerates processes with tasklist
Kills process with taskkill
Modifies data under HKEY_USERS
Modifies registry class
Runs ping.exe
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Drops file in Windows directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Looks up geolocation information via web service
Drops startup file
Loads dropped DLL
Reads user/profile data of web browsers
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
UPX packed file
OnlyLogger Payload
OnlyLogger
Process spawned unexpected child process
RedLine
RedLine Payload
SmokeLoader
Socelars
Socelars Payload
Suspicious use of NtCreateProcessExOtherParentProcess
Malware Config
C2 Extraction:
http://www.anquyebt.com/
http://abpa.at/upload/
http://emaratghajari.com/upload/
http://d7qw.cn/upload/
http://alumik-group.ru/upload/
http://zamkikurgan.ru/upload/
109.107.188.167:37171
92.255.57.115:11841
157.90.17.156:56409
http://abpa.at/upload/
http://emaratghajari.com/upload/
http://d7qw.cn/upload/
http://alumik-group.ru/upload/
http://zamkikurgan.ru/upload/
109.107.188.167:37171
92.255.57.115:11841
157.90.17.156:56409
Unpacked files
SH256 hash:
721d393191597d49d856baef2fbde75e48f52d0465e2cfabf1a41848b0e05589
MD5 hash:
b984a027c8a2abf874f3eb306a831613
SHA1 hash:
d3b3f8890adc840b0bd411cf304eef15d415ed48
Parent samples :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 hash:
069478bbcf2ba6bcb947cec42c8bea85ea93c86fa7ccc985f58ef29b876263a7
MD5 hash:
8562f4d1a71bffd7cdeb6dd49ce319f2
SHA1 hash:
79a943d4b30ec898bc3bdf5d54aa7d1625d67b02
SH256 hash:
245a869dc8a9bcb2190b5da3ea234740d79798385784e8db7aa3f2d2745192aa
MD5 hash:
4f93004835598b36011104e6f25dbdba
SHA1 hash:
6cb45092356c54f68d26f959e4a05ce80ef28483
SH256 hash:
a7e37f5314834b163fa21557e61c13c0f202fd64d3c0e46e6c90d2d02e033aec
MD5 hash:
6faec01bf7a3d7f5c5dee2e6e3143a58
SHA1 hash:
603a36f817cab5574e58ab279379e5c112e5fb37
SH256 hash:
565cb30a640d5cb469f9d93c969aab083fa14dfdf983411c132927665531795c
MD5 hash:
83b531c1515044f8241cd9627fbfbe86
SHA1 hash:
d2f7096e18531abb963fc9af7ecc543641570ac8
SH256 hash:
a7c864d00f3e1289f08710f5a47be1909c34fedb5a20066418fc804ffd61cea5
MD5 hash:
c8cdbc18bea69c8802c311a520c8e56e
SHA1 hash:
a440d612dfd453526653f0338a247c0ea86def45
SH256 hash:
6460754c17ab602b0ddfd2a82e637748b4a54139f6dbefa848ff01722a077acc
MD5 hash:
64638fe3e9d9acbcfe027bac3d0a7fab
SHA1 hash:
ff0d35497c4d6676a01a57db299df9847b382126
SH256 hash:
2e020b90832fe3f7f448c2c544ec5771ac8ebbe50f4088fc7ba5783f4d3820f9
MD5 hash:
a92ad358102f0f73746d405433e2969d
SHA1 hash:
ef0fbf2c9fb132cb9f22aae31ec1d69087ce942a
SH256 hash:
f60816afc4878a48da64d9c56029fdd1192dc5e30fd3b84f0736e02ea1279ce4
MD5 hash:
919f7ffad4526c4744d5ff749a71c95c
SHA1 hash:
8903a8bc8051c2bfb2d570ab420b1913af5f9c7f
SH256 hash:
d88d226e56838b573ba02a2683c47fae1420e2075751588b94392521af68a4e5
MD5 hash:
a5aa76c4f51b54f0ae636c74e83ebb78
SHA1 hash:
46f7db39a20cbbe409c84813976e064c310a0bb7
SH256 hash:
16dcd7575dbfb527f9d2c74e590a9adfdd27ce2b13a41b749861525f1419df1c
MD5 hash:
3cf2d4ebff2558dccd394fd225e25b91
SHA1 hash:
24530dc4e7d98190dce7bc10644a9c850d099296
SH256 hash:
4795816f6329a5da74a993e101b3b40f65fa1d8371bb328ef8184b37a7ea61a4
MD5 hash:
7b17f8f82bd57062bf36de9f0c41be8a
SHA1 hash:
1bd8773da3966d9fe48947f317d5a21fc1b9d3bc
SH256 hash:
53245f79dd4afbc280b6fd65371b39b38c616d5561b3a1518a254a6803252e9f
MD5 hash:
078306a72e5a1ccf7d04d3b215d3c1e9
SHA1 hash:
1328af462acb3dd0b294999a20e0e20fbbba8b7b
SH256 hash:
e2beaf61ef8408e20b5dd05ffab6e1a62774088b3acdebd834f51d77f9824112
MD5 hash:
ce54b9287c3e4b5733035d0be085d989
SHA1 hash:
07a17e423bf89d9b056562d822a8f651aeb33c96
SH256 hash:
0e81c9a3163302ab10d978fd68e6c7e2c3de44117a34dbdc980e4e978bb62f69
MD5 hash:
52ce170739f10a38326d31199310f3ad
SHA1 hash:
036a77dade3b598095548cee5f1106673e7ff23e
SH256 hash:
b0deae489b383866ded9200cdb68beac96084d9d7e139942835787b6f6a2378d
MD5 hash:
07c343e14742a3492892f020e0ebfb4f
SHA1 hash:
0229c8d4f1663699fa540bee05f8f5430d541be5
SH256 hash:
e1cc6a9d780602fe6e789bf5c3a27e87e197a4e3bf7c8138ea2f9dfec70fb963
MD5 hash:
f707252b9c9579677fffb013e0cfc646
SHA1 hash:
8ab483023fa8773afb8c13464c39c5b8e687f126
SH256 hash:
9912e7f9e9c18f46e965ca48ed65de8a28de7d301336500aaa5fd461e948822f
MD5 hash:
32404da1b26037746f9bf0d5628ea968
SHA1 hash:
8d2bf53983638235d5cc2f81171839801ba02e84
SH256 hash:
06d8294720be7342d4e6ea124b4ef0425727d55648db7c7220513b2d6e0c5f05
MD5 hash:
cdf00253597651ddbd7c319d0685ff46
SHA1 hash:
c10b20ed8d410c17c5396da6de3cdcd1c0ba9e98
SH256 hash:
7dd3b10a47a58dfc1c4314027c048b6212acd433d10214eda402367ac1e2e028
MD5 hash:
dc4c68d29e81d25d408d0263433b88bd
SHA1 hash:
1037d07a808fd00d7f218acbd5ca257b00c1cab5
SH256 hash:
bbd5e169cb921c7f31ee64270c1f908d82d196dc92620252380c2b94ac84e60d
MD5 hash:
dc3985ed3ffc424fffecad22cada2dc6
SHA1 hash:
524c518100a25cb80123bc8f7bef57a0b5ce7a97
SH256 hash:
f08d854b9c2375f5e3fea7adb98fb7297239d201aef0e1b15c343e4c33a7fefa
MD5 hash:
c7af5cbe946862902e008efb5702db0c
SHA1 hash:
2c19eb8ced1688535dae09f9dcb6400355a68f15
SH256 hash:
5d2cbf33e3f08ed65d3fc8500c8b9b5ed4f0d376ebb85fa108cb3e4c247e2c92
MD5 hash:
f872c0a46810fa0e1b6fe9bde0e2cf4e
SHA1 hash:
0c7a0f5b37abc2a4a056aabaa8092cb21a2cde37
SH256 hash:
cc71584124276ff6fe3f7a16d2887e2e7d3a381a562c720c249dd68af9b58b92
MD5 hash:
9b986a410202bd1405d04a47ecc72af8
SHA1 hash:
66c014e4b393e4477c48b4af050f4a1ce1b80f65
SH256 hash:
5c9bc988a87b60e4bbc6838cd228a9e095212eab153780e1f71e5cc4e9b18dbb
MD5 hash:
72cdb43b768bebc9fb1d9a76ec338d9a
SHA1 hash:
53544902ba62bec69a571016b42a1fac67d4346f
SH256 hash:
7694f0ca515cc7507758e92fef7e8e585fdcbee7cfa24bb18d84c5b65c77f1d5
MD5 hash:
1c9bf5b51390ba044ad5d2698b6b2c96
SHA1 hash:
531deb52ea33351c4e07b5d8880ee0761e4720e7
SH256 hash:
4c8f155e0e2be881bc636e260a425030ffd812bcd4a6ebba1b864174c0905bd9
MD5 hash:
368a58367b1e9e7f32cb4a5a1d6cea96
SHA1 hash:
9f294e033beb465a183ad31d5bf5f8b79c182da9
SH256 hash:
001a5a474bbbd8f905626617e612861e7f1de5286b009960c0deefbf06508723
MD5 hash:
b38f807fc02e26c295c37f41f448352e
SHA1 hash:
afb5b26b9409cf228e12bfa3f4a63c64ca9949cb
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.