MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 135fd5505ae34fedd5139480d1f88551820abb156a67aec7407fab0ca3d197d3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GCleaner


Vendor detections: 13


Intelligence 13 IOCs YARA 3 File information Comments

SHA256 hash: 135fd5505ae34fedd5139480d1f88551820abb156a67aec7407fab0ca3d197d3
SHA3-384 hash: e6384f684d6412278fe6817e8c76705b5c9d60154f07cc45bbe5c4c1acd7a704446c5821b643914d91b54db86ca5ef19
SHA1 hash: 856e182d7da28f9f83086536193b62b039f4b489
MD5 hash: f07c63b25d0b714ab139945bf05dbb2d
humanhash: spring-dakota-fanta-pennsylvania
File name:file
Download: download sample
Signature GCleaner
File size:1'729'846 bytes
First seen:2023-07-14 04:51:11 UTC
Last seen:2023-07-14 05:48:49 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 884310b1928934402ea6fec1dbd3cf5e (3'725 x GCleaner, 3'445 x Socks5Systemz, 262 x RaccoonStealer)
ssdeep 24576:1fOy0qP3bC2ZUJ89efu43KFS/F5Kh+sdfL8HFKmLNT540DoCBcPCmj4WhiqBv+nk:1GwPrCuCiWadfLS/LNdgtj4ev+v8
Threatray 3'571 similar samples on MalwareBazaar
TLSH T1CA853322F7FAD077D6F099F84C2A608F99BA9EB085B254557E8C9E1C173E9C04807793
TrID 50.8% (.EXE) Win32 Executable PowerBASIC/Win 9.x (148303/79/28)
37.6% (.EXE) Inno Setup installer (109740/4/30)
4.8% (.EXE) Win32 Executable Delphi generic (14182/79/4)
2.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
1.5% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 70f0f0e8e8b2f0f0 (29 x GCleaner)
Reporter andretavare5
Tags:exe gcleaner


Avatar
andretavare5
Sample downloaded from http://45.12.253.74/pineapple.php?pub=mixinte

Intelligence


File Origin
# of uploads :
2
# of downloads :
285
Origin country :
US US
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
file
Verdict:
Malicious activity
Analysis date:
2023-07-14 04:54:22 UTC
Tags:
installer gcleaner

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %temp% subdirectories
Creating a window
Creating a process from a recently created file
Сreating synchronization primitives
Creating a file in the Program Files subdirectories
Moving a file to the Program Files subdirectory
Launching the process to interact with network services
Modifying a system file
Searching for synchronization primitives
Launching a process
Sending a custom TCP request
Creating a file in the %AppData% subdirectories
Running batch commands
Creating a process with a hidden window
Launching a tool to kill processes
Sending an HTTP GET request to an infection source
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckCmdLine
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
control greyware installer lolbin overlay packed packed shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Machine Learning detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Nymaim
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1272893 Sample: file.exe Startdate: 14/07/2023 Architecture: WINDOWS Score: 100 40 45.12.253.72 CMCSUS Germany 2->40 42 45.12.253.75 CMCSUS Germany 2->42 44 45.12.253.98 CMCSUS Germany 2->44 48 Found malware configuration 2->48 50 Antivirus detection for URL or domain 2->50 52 Multi AV Scanner detection for submitted file 2->52 54 5 other signatures 2->54 9 file.exe 2 2->9         started        signatures3 process4 file5 30 C:\Users\user\AppData\Local\...\is-K6ALP.tmp, PE32 9->30 dropped 12 is-K6ALP.tmp 11 102 9->12         started        process6 file7 32 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 12->32 dropped 34 C:\Users\user\AppData\Local\...\_iscrypt.dll, PE32 12->34 dropped 36 C:\...\unins000.exe (copy), PE32 12->36 dropped 38 8 other files (6 malicious) 12->38 dropped 15 RewSpacer714.exe 8 12->15         started        19 net.exe 1 12->19         started        process8 dnsIp9 46 45.12.253.56, 80 CMCSUS Germany 15->46 28 C:\Users\user\AppData\...\me0iszmk63.exe, PE32 15->28 dropped 21 me0iszmk63.exe 15->21         started        24 conhost.exe 19->24         started        26 net1.exe 1 19->26         started        file10 process11 signatures12 56 Multi AV Scanner detection for dropped file 21->56
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2023-07-14 04:52:10 UTC
File Type:
PE (Exe)
Extracted files:
5
AV detection:
8 of 24 (33.33%)
Threat level:
  5/5
Result
Malware family:
gcleaner
Score:
  10/10
Tags:
family:gcleaner discovery loader
Behaviour
Kills process with taskkill
Runs net.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Checks installed software on the system
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
GCleaner
Malware Config
C2 Extraction:
45.12.253.56
45.12.253.72
45.12.253.98
45.12.253.75
Unpacked files
SH256 hash:
93308f95be0517595235721ad70abacffa937da0da80c1a9a9511b44d7302339
MD5 hash:
6bf7bf18650b2e136b4742fb1fb1b783
SHA1 hash:
b0bb1a3a964db06b9eae8b82f3ac344d78063757
Detections:
Nymaim win_nymaim_g0 win_gcleaner_auto
Parent samples :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 hash:
7ad3fc79bf6dc20f21a23d2da3e865d322a56a627c4c07a349e83ff27c8f0993
MD5 hash:
6c133141f647f4618c4adf83440ed658
SHA1 hash:
b19217179fcf8b95c757485c108ee938681a976e
SH256 hash:
758685495bef22bee5620a59935038d2170a762b6ecd15e4f77bd9941e213291
MD5 hash:
96c0e9d4dd808979eaa6c378efcc10e5
SHA1 hash:
6dbe1727943cfb74f38e952499e9a84e953d3bf9
SH256 hash:
753083de10b230da03c6e2bc4865bbefb9a9c94d8946699d3a6d903048f0ba94
MD5 hash:
fc245721f161c38115ecec21ef18971b
SHA1 hash:
0d7652a91c74b7861948293dfd80f1d7831a73fb
SH256 hash:
135fd5505ae34fedd5139480d1f88551820abb156a67aec7407fab0ca3d197d3
MD5 hash:
f07c63b25d0b714ab139945bf05dbb2d
SHA1 hash:
856e182d7da28f9f83086536193b62b039f4b489
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
Rule name:win_gcleaner_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.gcleaner.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Dropped by
PrivateLoader
  
Delivery method
Distributed via drive-by

Comments