MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0824b117cd7e5ca894368feea852ffe7aefb584974ab8bf7ad87a53422e5effc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GCleaner


Vendor detections: 12


Intelligence 12 IOCs YARA 3 File information Comments

SHA256 hash: 0824b117cd7e5ca894368feea852ffe7aefb584974ab8bf7ad87a53422e5effc
SHA3-384 hash: 6f1039002ddb1f02199b3e1dedc9529313907ab7146933537d76903abdd4f249477bc03d42b1568a421496616a86da10
SHA1 hash: 7c25dbe45ddc442319bbd175c7ec98761c8bc226
MD5 hash: ac6085dd16738c1fb79968344ac8582c
humanhash: sodium-carolina-uniform-kansas
File name:file
Download: download sample
Signature GCleaner
File size:1'749'167 bytes
First seen:2023-07-19 22:38:53 UTC
Last seen:2023-07-19 23:40:35 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 884310b1928934402ea6fec1dbd3cf5e (3'725 x GCleaner, 3'503 x Socks5Systemz, 262 x RaccoonStealer)
ssdeep 24576:P2lWLzyFufrY/KvGaBnhDXgw/n5lpNowMFM0MGmxkDUNCCkMIubvEM6:P2YLzyFv/KOQlQw/5lTglMGmeY0XMtB6
Threatray 87 similar samples on MalwareBazaar
TLSH T1CF853372D59189F4F5A21EF0ED10E92931B67C24DD78CD4C3AAD6A9D2F379420C873A4
TrID 46.3% (.EXE) Win32 Executable PowerBASIC/Win 9.x (148303/79/28)
34.2% (.EXE) Inno Setup installer (109740/4/30)
13.4% (.EXE) InstallShield setup (43053/19/16)
2.0% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
1.4% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon b298acbab2ca7a72 (2'327 x GCleaner, 1'631 x Socks5Systemz, 67 x RedLineStealer)
Reporter andretavare5
Tags:exe gcleaner


Avatar
andretavare5
Sample downloaded from http://45.12.253.74/pineapple.php?pub=mixinte

Intelligence


File Origin
# of uploads :
2
# of downloads :
297
Origin country :
US US
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
file
Verdict:
Suspicious activity
Analysis date:
2023-07-19 22:39:52 UTC
Tags:
installer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
control greyware installer lolbin overlay packed shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Machine Learning detection for dropped file
Multi AV Scanner detection for dropped file
Snort IDS alert for network traffic
Yara detected Nymaim
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1276350 Sample: file.exe Startdate: 20/07/2023 Architecture: WINDOWS Score: 100 53 45.12.253.98 CMCSUS Germany 2->53 55 Snort IDS alert for network traffic 2->55 57 Found malware configuration 2->57 59 Antivirus detection for URL or domain 2->59 61 6 other signatures 2->61 10 file.exe 2 2->10         started        signatures3 process4 file5 37 C:\Users\user\AppData\Local\...\file.exe.tmp, PE32 10->37 dropped 13 file.exe.tmp 11 102 10->13         started        process6 file7 39 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 13->39 dropped 41 C:\Users\user\AppData\Local\...\_iscrypt.dll, PE32 13->41 dropped 43 C:\...\unins000.exe (copy), PE32 13->43 dropped 45 8 other files (6 malicious) 13->45 dropped 16 FBSpacer719.exe 24 13->16         started        20 net.exe 1 13->20         started        process8 dnsIp9 47 45.12.253.56, 49680, 80 CMCSUS Germany 16->47 49 45.12.253.72, 49681, 80 CMCSUS Germany 16->49 51 45.12.253.75, 49682, 80 CMCSUS Germany 16->51 35 C:\Users\user\AppData\...\rN9lskwBh3vXc.exe, PE32 16->35 dropped 22 rN9lskwBh3vXc.exe 16->22         started        25 cmd.exe 1 16->25         started        27 conhost.exe 20->27         started        29 net1.exe 1 20->29         started        file10 process11 signatures12 63 Multi AV Scanner detection for dropped file 22->63 31 taskkill.exe 1 25->31         started        33 conhost.exe 25->33         started        process13
Threat name:
Win32.Trojan.Privateloader
Status:
Suspicious
First seen:
2023-07-19 22:39:04 UTC
File Type:
PE (Exe)
Extracted files:
5
AV detection:
14 of 25 (56.00%)
Threat level:
  5/5
Result
Malware family:
gcleaner
Score:
  10/10
Tags:
family:gcleaner discovery loader
Behaviour
Suspicious use of WriteProcessMemory
Kills process with taskkill
Runs net.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Enumerates physical storage devices
Drops file in Program Files directory
Checks installed software on the system
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
GCleaner
Malware Config
C2 Extraction:
45.12.253.56
45.12.253.72
45.12.253.98
45.12.253.75
Unpacked files
SH256 hash:
1b254c03f8f50becca9875a4b413f0bf4aa8a4419e133ebe116bc9ba1aaaf735
MD5 hash:
13ee49550159ca065a0a8c5fc78eab4d
SHA1 hash:
f5209142f7ba57a32098dacd710808170cd2679b
SH256 hash:
f09a242c89c06a1162bcba2d491b6e85a3c03951eaa95473f4ca340e4a0466cb
MD5 hash:
8fb972ea0c7540ec92cc093657ec046e
SHA1 hash:
d1a7083a08d40f34e77ec943c2e5fae4a250312e
SH256 hash:
6afb7a23cf9617562e89f6aaedcdc845eaf1605a50760947a61777433d129755
MD5 hash:
05b75d9fc3162b4542894f02c77d36dc
SHA1 hash:
75c83c121e8b0233fe946673ca23967c5b180232
SH256 hash:
0824b117cd7e5ca894368feea852ffe7aefb584974ab8bf7ad87a53422e5effc
MD5 hash:
ac6085dd16738c1fb79968344ac8582c
SHA1 hash:
7c25dbe45ddc442319bbd175c7ec98761c8bc226
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
Rule name:win_gcleaner_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.gcleaner.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Dropped by
PrivateLoader
  
Delivery method
Distributed via drive-by

Comments