MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0e400163a03dafcdd1fb201f1d14c3a44fee91f057d8f5801d1dbbc4db6b5a7d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GCleaner


Vendor detections: 15


Intelligence 15 IOCs YARA 6 File information Comments

SHA256 hash: 0e400163a03dafcdd1fb201f1d14c3a44fee91f057d8f5801d1dbbc4db6b5a7d
SHA3-384 hash: 45ebdd0e533d660724f8895d83662ee1850e60397781942866dce412a68ef165f3c3696b5442ff8182d5e1f139d6e987
SHA1 hash: 3a6a8ada084280ce3acf105d3175e31e730d0bfc
MD5 hash: af31a627efb4236e9907a19847810f35
humanhash: stairway-lithium-edward-uranus
File name:lapismixtwo.exe
Download: download sample
Signature GCleaner
File size:3'320'096 bytes
First seen:2025-06-25 07:14:12 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c919e586b47b1d38ff6ebeebdb083996 (7 x GCleaner)
ssdeep 98304:wl+xRirVZ9/u9n975SpTISxhUyaHeE0EXk/:wl+v+VZNuNR5cTIS3UySy
TLSH T119E5F17396E00E3BF514237A5F1EB9CDEFE9AD4022D8D447ABC62D778A0514249A3EC1
TrID 52.9% (.EXE) Win32 Executable Delphi generic (14182/79/4)
16.8% (.EXE) Win32 Executable (generic) (4504/4/1)
7.7% (.EXE) Win16/32 Executable Delphi generic (2072/23)
7.5% (.EXE) OS/2 Executable (generic) (2029/13)
7.4% (.EXE) Generic Win/DOS Executable (2002/3)
Magika pebin
Reporter abuse_ch
Tags:exe gcleaner

Intelligence


File Origin
# of uploads :
1
# of downloads :
389
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
lapismixtwo.exe
Verdict:
Malicious activity
Analysis date:
2025-06-25 07:58:59 UTC
Tags:
delphi

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
97.4%
Tags:
delphi cobalt emotet
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a window
Creating a file in the %temp% directory
Creating a process from a recently created file
DNS request
Connection attempt
Sending a custom TCP request
Unauthorized injection to a recently created process by context flags manipulation
Connection attempt to an infection source
Sending an HTTP GET request to an infection source
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
adaptive-context anti-debug borland_delphi entropy expired-cert fingerprint invalid-signature keylogger packed packed packer_detected signed
Result
Threat name:
CryptOne
Detection:
malicious
Classification:
troj.evad
Score:
84 / 100
Signature
Antivirus detection for dropped file
Found hidden mapped module (file has been removed from disk)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Writes to foreign memory regions
Yara detected CryptOne packer
Behaviour
Behavior Graph:
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PE (Portable Executable) Win 32 Exe x86
Threat name:
Win32.Infostealer.Tinba
Status:
Malicious
First seen:
2025-06-25 07:15:43 UTC
File Type:
PE (Exe)
Extracted files:
36
AV detection:
21 of 24 (87.50%)
Threat level:
  5/5
Result
Malware family:
gcleaner
Score:
  10/10
Tags:
family:gcleaner discovery loader
Behaviour
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Executes dropped EXE
Loads dropped DLL
Downloads MZ/PE file
GCleaner
Gcleaner family
Malware Config
C2 Extraction:
45.91.200.135
Unpacked files
SH256 hash:
0e400163a03dafcdd1fb201f1d14c3a44fee91f057d8f5801d1dbbc4db6b5a7d
MD5 hash:
af31a627efb4236e9907a19847810f35
SHA1 hash:
3a6a8ada084280ce3acf105d3175e31e730d0bfc
SH256 hash:
e736389378e91b3d96701822d29deb657fa8d7b3da1d93430c70236917b697bd
MD5 hash:
d2f15c47e3baa1062ab4232f5d7ca851
SHA1 hash:
7a2170fec90546f3d9054616ccc35ca483d4d2e5
Detections:
GCleaner
Parent samples :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 hash:
0a0b083cc0e62db594b7be21088202c7fe0970d609b2847085d0bf2be8e54a5c
MD5 hash:
4ce3ce196eda86d92b68362b6269b618
SHA1 hash:
fd42ee0aca0315acac25c297f1ce33634c549559
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BobSoftMiniDelphiBoBBobSoft
Author:malware-lu
Rule name:Borland
Author:malware-lu
Rule name:pe_detect_tls_callbacks
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

GCleaner

Executable exe 0e400163a03dafcdd1fb201f1d14c3a44fee91f057d8f5801d1dbbc4db6b5a7d

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
WIN32_PROCESS_APICan Create Process and Threadskernel32.dll::CloseHandle
kernel32.dll::CreateThread
WIN_BASE_APIUses Win Base APIkernel32.dll::LoadLibraryExA
kernel32.dll::LoadLibraryA
kernel32.dll::GetSystemInfo
kernel32.dll::GetStartupInfoA
kernel32.dll::GetDiskFreeSpaceA
kernel32.dll::GetCommandLineA
WIN_BASE_IO_APICan Create Fileskernel32.dll::CreateFileA
kernel32.dll::FindFirstFileA
version.dll::GetFileVersionInfoSizeA
version.dll::GetFileVersionInfoA
WIN_REG_APICan Manipulate Windows Registryadvapi32.dll::RegOpenKeyExA
advapi32.dll::RegQueryValueExA
WIN_USER_APIPerforms GUI Actionsuser32.dll::ActivateKeyboardLayout
user32.dll::CreateMenu
user32.dll::FindWindowA
user32.dll::PeekMessageA
user32.dll::CreateWindowExA

Comments