MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 001a5a474bbbd8f905626617e612861e7f1de5286b009960c0deefbf06508723. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GCleaner


Vendor detections: 13


Intelligence 13 IOCs 2 YARA File information Comments

SHA256 hash: 001a5a474bbbd8f905626617e612861e7f1de5286b009960c0deefbf06508723
SHA3-384 hash: 9cd9864797a93e842bcbc0bfd64c6ca577c1e5f968534977132853712452f15e82178eefb30d6c6b81646e3e7b574434
SHA1 hash: afb5b26b9409cf228e12bfa3f4a63c64ca9949cb
MD5 hash: b38f807fc02e26c295c37f41f448352e
humanhash: summer-lion-eleven-romeo
File name:b38f807fc02e26c295c37f41f448352e.exe
Download: download sample
Signature GCleaner
File size:7'263'053 bytes
First seen:2022-01-30 06:46:23 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 101 x GuLoader, 64 x DiamondFox)
ssdeep 196608:J/CTEC8IEE4pW73zw5pG3PwrA1wkNK0fsZkcG1VUA8m83xj4DE0:J/11hW73zw56IIwkNfUZ7GX38mexr0
Threatray 1'365 similar samples on MalwareBazaar
TLSH T1A57633F667429F51E7EE6972816F90060471FA079A82F21A4F3A145F22476F4FB12F32
File icon (PE):PE icon
dhash icon b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla)
Reporter abuse_ch
Tags:exe gcleaner


Avatar
abuse_ch
GCleaner C2:
157.90.17.156:56409

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
157.90.17.156:56409 https://threatfox.abuse.ch/ioc/366514/
92.255.57.115:11841 https://threatfox.abuse.ch/ioc/366527/

Intelligence


File Origin
# of uploads :
1
# of downloads :
243
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
b38f807fc02e26c295c37f41f448352e.exe
Verdict:
No threats detected
Analysis date:
2022-01-30 06:56:54 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %temp% directory
Сreating synchronization primitives
Creating a process from a recently created file
Creating a file
Running batch commands
Sending a custom TCP request
DNS request
Sending an HTTP GET request
Launching a process
Searching for synchronization primitives
Creating a window
Searching for analyzing tools
Creating a process with a hidden window
Launching the default Windows debugger (dwwin.exe)
Launching cmd.exe command interpreter
Unauthorized injection to a recently created process
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
control.exe overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine SmokeLoader Socelars onlyLogger
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates processes via WMI
Disables Windows Defender (via service or powershell)
Hides threads from debuggers
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
PE file has nameless sections
Performs DNS queries to domains with low reputation
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to evade analysis by execution special instruction which cause usermode exception
Yara detected Generic Downloader
Yara detected onlyLogger
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Socelars
Yara Genericmalware
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 562790 Sample: l2OGKn1Tzq.exe Startdate: 30/01/2022 Architecture: WINDOWS Score: 100 84 81.4.105.174 ASN-ROUTELABELNL Netherlands 2->84 86 www.listincode.com 149.28.253.196, 443, 49754 AS-CHOOPAUS United States 2->86 88 iplogger.org 2->88 110 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->110 112 Malicious sample detected (through community Yara rule) 2->112 114 Antivirus detection for URL or domain 2->114 116 20 other signatures 2->116 11 l2OGKn1Tzq.exe 10 2->11         started        signatures3 process4 file5 70 C:\Users\user\AppData\...\setup_installer.exe, PE32 11->70 dropped 14 setup_installer.exe 23 11->14         started        process6 file7 72 C:\Users\user\AppData\...\setup_install.exe, PE32 14->72 dropped 74 C:\Users\...\61f2a4482b7cd_Thu13de8b95d.exe, PE32 14->74 dropped 76 C:\Users\...\61f2a4473bd33_Thu137ea27cece.exe, PE32 14->76 dropped 78 18 other files (11 malicious) 14->78 dropped 17 setup_install.exe 1 14->17         started        process8 dnsIp9 80 hornygl.xyz 104.21.37.14, 49752, 80 CLOUDFLARENETUS United States 17->80 82 127.0.0.1 unknown unknown 17->82 106 Performs DNS queries to domains with low reputation 17->106 108 Disables Windows Defender (via service or powershell) 17->108 21 cmd.exe 17->21         started        23 cmd.exe 1 17->23         started        25 cmd.exe 17->25         started        27 9 other processes 17->27 signatures10 process11 signatures12 30 61f2a43ad0f63_Thu131ffbc6f81.exe 21->30         started        34 61f2a438412ef_Thu13ca6fdf618.exe 14 5 23->34         started        37 61f2a440e0595_Thu13e57cda.exe 25->37         started        118 Disables Windows Defender (via service or powershell) 27->118 39 61f2a43e82688_Thu13dc171e6354.exe 27->39         started        41 61f2a439c97e1_Thu13d21d3d56.exe 27->41         started        43 61f2a4362b5bc_Thu13dc1c7eb3.exe 1 27->43         started        45 4 other processes 27->45 process13 dnsIp14 92 104.21.76.213 CLOUDFLARENETUS United States 30->92 120 Tries to detect sandboxes and other dynamic analysis tools (window names) 30->120 122 Machine Learning detection for dropped file 30->122 124 Tries to evade analysis by execution special instruction which cause usermode exception 30->124 126 Hides threads from debuggers 30->126 94 iplogger.org 148.251.234.83, 443, 49735, 49743 HETZNER-ASDE Germany 34->94 96 cdn.discordapp.com 162.159.133.233, 443, 49741 CLOUDFLARENETUS United States 34->96 98 192.168.2.1 unknown unknown 34->98 54 C:\Users\user\AppData\Local\...\LzmwAqmV.exe, PE32 34->54 dropped 128 Antivirus detection for dropped file 34->128 130 May check the online IP address of the machine 34->130 100 ip-api.com 208.95.112.1, 49746, 80 TUT-ASUS United States 37->100 102 www.hhiuew33.com 45.136.151.102, 49799, 80 ENZUINC-US Latvia 37->102 56 C:\Users\user\AppData\Local\Temp\11111.exe, PE32 37->56 dropped 104 signaturebusinesspark.com 103.211.216.223, 443, 49753, 49758 PUBLIC-DOMAIN-REGISTRYUS Seychelles 39->104 58 C:\Users\user\AppData\Local\...\fw3[1].exe, PE32 39->58 dropped 60 C:\Users\user\AppData\Local\...\fw4[1].exe, PE32 39->60 dropped 62 C:\Users\user\AppData\Roaming\9D5E.tmp.exe, PE32 39->62 dropped 64 C:\Users\user\AppData\Roaming\4385.tmp.exe, PE32 39->64 dropped 47 61f2a439c97e1_Thu13d21d3d56.exe 41->47         started        132 Creates processes via WMI 43->132 50 61f2a4362b5bc_Thu13dc1c7eb3.exe 43->50         started        66 C:\Users\user\AppData\Local\Temp\CZlKa.Q5, PE32 45->66 dropped file15 signatures16 process17 dnsIp18 134 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 47->134 136 Checks if the current machine is a virtual machine (disk enumeration) 47->136 90 v.xyzgamev.com 104.21.40.196, 443, 49736, 49745 CLOUDFLARENETUS United States 50->90 68 C:\Users\user\AppData\Local\Temp\db.dll, PE32 50->68 dropped file19 signatures20
Threat name:
Win32.Trojan.SmallDownloader
Status:
Malicious
First seen:
2022-01-28 09:55:23 UTC
File Type:
PE (Exe)
Extracted files:
382
AV detection:
30 of 43 (69.77%)
Threat level:
  5/5
Result
Malware family:
socelars
Score:
  10/10
Tags:
family:onlylogger family:redline family:smokeloader family:socelars botnet:20kprofessor2 botnet:buildnewmast botnet:media262231 aspackv2 backdoor discovery infostealer loader persistence spyware stealer trojan upx
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Delays execution with timeout.exe
Enumerates processes with tasklist
Kills process with taskkill
Modifies data under HKEY_USERS
Modifies registry class
Runs ping.exe
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Drops file in Windows directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Looks up geolocation information via web service
Drops startup file
Loads dropped DLL
Reads user/profile data of web browsers
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
UPX packed file
OnlyLogger Payload
OnlyLogger
Process spawned unexpected child process
RedLine
RedLine Payload
SmokeLoader
Socelars
Socelars Payload
Suspicious use of NtCreateProcessExOtherParentProcess
Malware Config
C2 Extraction:
http://www.anquyebt.com/
http://abpa.at/upload/
http://emaratghajari.com/upload/
http://d7qw.cn/upload/
http://alumik-group.ru/upload/
http://zamkikurgan.ru/upload/
109.107.188.167:37171
92.255.57.115:11841
157.90.17.156:56409
Unpacked files
SH256 hash:
069478bbcf2ba6bcb947cec42c8bea85ea93c86fa7ccc985f58ef29b876263a7
MD5 hash:
8562f4d1a71bffd7cdeb6dd49ce319f2
SHA1 hash:
79a943d4b30ec898bc3bdf5d54aa7d1625d67b02
SH256 hash:
245a869dc8a9bcb2190b5da3ea234740d79798385784e8db7aa3f2d2745192aa
MD5 hash:
4f93004835598b36011104e6f25dbdba
SHA1 hash:
6cb45092356c54f68d26f959e4a05ce80ef28483
SH256 hash:
a7e37f5314834b163fa21557e61c13c0f202fd64d3c0e46e6c90d2d02e033aec
MD5 hash:
6faec01bf7a3d7f5c5dee2e6e3143a58
SHA1 hash:
603a36f817cab5574e58ab279379e5c112e5fb37
SH256 hash:
565cb30a640d5cb469f9d93c969aab083fa14dfdf983411c132927665531795c
MD5 hash:
83b531c1515044f8241cd9627fbfbe86
SHA1 hash:
d2f7096e18531abb963fc9af7ecc543641570ac8
SH256 hash:
a7c864d00f3e1289f08710f5a47be1909c34fedb5a20066418fc804ffd61cea5
MD5 hash:
c8cdbc18bea69c8802c311a520c8e56e
SHA1 hash:
a440d612dfd453526653f0338a247c0ea86def45
SH256 hash:
6460754c17ab602b0ddfd2a82e637748b4a54139f6dbefa848ff01722a077acc
MD5 hash:
64638fe3e9d9acbcfe027bac3d0a7fab
SHA1 hash:
ff0d35497c4d6676a01a57db299df9847b382126
SH256 hash:
2e020b90832fe3f7f448c2c544ec5771ac8ebbe50f4088fc7ba5783f4d3820f9
MD5 hash:
a92ad358102f0f73746d405433e2969d
SHA1 hash:
ef0fbf2c9fb132cb9f22aae31ec1d69087ce942a
SH256 hash:
f60816afc4878a48da64d9c56029fdd1192dc5e30fd3b84f0736e02ea1279ce4
MD5 hash:
919f7ffad4526c4744d5ff749a71c95c
SHA1 hash:
8903a8bc8051c2bfb2d570ab420b1913af5f9c7f
SH256 hash:
d88d226e56838b573ba02a2683c47fae1420e2075751588b94392521af68a4e5
MD5 hash:
a5aa76c4f51b54f0ae636c74e83ebb78
SHA1 hash:
46f7db39a20cbbe409c84813976e064c310a0bb7
SH256 hash:
16dcd7575dbfb527f9d2c74e590a9adfdd27ce2b13a41b749861525f1419df1c
MD5 hash:
3cf2d4ebff2558dccd394fd225e25b91
SHA1 hash:
24530dc4e7d98190dce7bc10644a9c850d099296
SH256 hash:
4795816f6329a5da74a993e101b3b40f65fa1d8371bb328ef8184b37a7ea61a4
MD5 hash:
7b17f8f82bd57062bf36de9f0c41be8a
SHA1 hash:
1bd8773da3966d9fe48947f317d5a21fc1b9d3bc
SH256 hash:
53245f79dd4afbc280b6fd65371b39b38c616d5561b3a1518a254a6803252e9f
MD5 hash:
078306a72e5a1ccf7d04d3b215d3c1e9
SHA1 hash:
1328af462acb3dd0b294999a20e0e20fbbba8b7b
SH256 hash:
e2beaf61ef8408e20b5dd05ffab6e1a62774088b3acdebd834f51d77f9824112
MD5 hash:
ce54b9287c3e4b5733035d0be085d989
SHA1 hash:
07a17e423bf89d9b056562d822a8f651aeb33c96
SH256 hash:
0e81c9a3163302ab10d978fd68e6c7e2c3de44117a34dbdc980e4e978bb62f69
MD5 hash:
52ce170739f10a38326d31199310f3ad
SHA1 hash:
036a77dade3b598095548cee5f1106673e7ff23e
SH256 hash:
b0deae489b383866ded9200cdb68beac96084d9d7e139942835787b6f6a2378d
MD5 hash:
07c343e14742a3492892f020e0ebfb4f
SHA1 hash:
0229c8d4f1663699fa540bee05f8f5430d541be5
SH256 hash:
e1cc6a9d780602fe6e789bf5c3a27e87e197a4e3bf7c8138ea2f9dfec70fb963
MD5 hash:
f707252b9c9579677fffb013e0cfc646
SHA1 hash:
8ab483023fa8773afb8c13464c39c5b8e687f126
SH256 hash:
9912e7f9e9c18f46e965ca48ed65de8a28de7d301336500aaa5fd461e948822f
MD5 hash:
32404da1b26037746f9bf0d5628ea968
SHA1 hash:
8d2bf53983638235d5cc2f81171839801ba02e84
SH256 hash:
06d8294720be7342d4e6ea124b4ef0425727d55648db7c7220513b2d6e0c5f05
MD5 hash:
cdf00253597651ddbd7c319d0685ff46
SHA1 hash:
c10b20ed8d410c17c5396da6de3cdcd1c0ba9e98
SH256 hash:
7dd3b10a47a58dfc1c4314027c048b6212acd433d10214eda402367ac1e2e028
MD5 hash:
dc4c68d29e81d25d408d0263433b88bd
SHA1 hash:
1037d07a808fd00d7f218acbd5ca257b00c1cab5
SH256 hash:
bbd5e169cb921c7f31ee64270c1f908d82d196dc92620252380c2b94ac84e60d
MD5 hash:
dc3985ed3ffc424fffecad22cada2dc6
SHA1 hash:
524c518100a25cb80123bc8f7bef57a0b5ce7a97
SH256 hash:
f08d854b9c2375f5e3fea7adb98fb7297239d201aef0e1b15c343e4c33a7fefa
MD5 hash:
c7af5cbe946862902e008efb5702db0c
SHA1 hash:
2c19eb8ced1688535dae09f9dcb6400355a68f15
SH256 hash:
5d2cbf33e3f08ed65d3fc8500c8b9b5ed4f0d376ebb85fa108cb3e4c247e2c92
MD5 hash:
f872c0a46810fa0e1b6fe9bde0e2cf4e
SHA1 hash:
0c7a0f5b37abc2a4a056aabaa8092cb21a2cde37
SH256 hash:
cc71584124276ff6fe3f7a16d2887e2e7d3a381a562c720c249dd68af9b58b92
MD5 hash:
9b986a410202bd1405d04a47ecc72af8
SHA1 hash:
66c014e4b393e4477c48b4af050f4a1ce1b80f65
SH256 hash:
5c9bc988a87b60e4bbc6838cd228a9e095212eab153780e1f71e5cc4e9b18dbb
MD5 hash:
72cdb43b768bebc9fb1d9a76ec338d9a
SHA1 hash:
53544902ba62bec69a571016b42a1fac67d4346f
SH256 hash:
7694f0ca515cc7507758e92fef7e8e585fdcbee7cfa24bb18d84c5b65c77f1d5
MD5 hash:
1c9bf5b51390ba044ad5d2698b6b2c96
SHA1 hash:
531deb52ea33351c4e07b5d8880ee0761e4720e7
SH256 hash:
4c8f155e0e2be881bc636e260a425030ffd812bcd4a6ebba1b864174c0905bd9
MD5 hash:
368a58367b1e9e7f32cb4a5a1d6cea96
SHA1 hash:
9f294e033beb465a183ad31d5bf5f8b79c182da9
SH256 hash:
001a5a474bbbd8f905626617e612861e7f1de5286b009960c0deefbf06508723
MD5 hash:
b38f807fc02e26c295c37f41f448352e
SHA1 hash:
afb5b26b9409cf228e12bfa3f4a63c64ca9949cb
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments