MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 13623e711bf1f8f66e3a58db1f55183bbb6c3f77f7dda0cda71797fb16b2649f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GCleaner


Vendor detections: 12


Intelligence 12 IOCs YARA 3 File information Comments

SHA256 hash: 13623e711bf1f8f66e3a58db1f55183bbb6c3f77f7dda0cda71797fb16b2649f
SHA3-384 hash: 6018f76f3005ee8549bc84dd26acc7e47236910e1c5e29874e62670d691af5a2dc719320e815ed2fd9dd22031b471dd3
SHA1 hash: 7539e340a99aac4512cd5eeabcdfd05bd32fe1c8
MD5 hash: 89aadd440c921143d44ab6383d46eaf2
humanhash: ten-sad-table-march
File name:file
Download: download sample
Signature GCleaner
File size:2'053'133 bytes
First seen:2023-01-20 02:56:28 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 884310b1928934402ea6fec1dbd3cf5e (3'725 x GCleaner, 3'514 x Socks5Systemz, 262 x RaccoonStealer)
ssdeep 49152:1kwI9UBu17HZlRD+kprMhMqzZHS0H8dlAL6r:zGj7np+kspL8dlAL6r
TLSH T1D89533428E6B14B5DEE696742A15C2905D3FBF1A7C31A506F64E3B14A2773C2C43B3A2
TrID 78.6% (.EXE) Inno Setup installer (109740/4/30)
10.1% (.EXE) Win32 Executable Delphi generic (14182/79/4)
3.2% (.EXE) Win32 Executable (generic) (4505/5/1)
2.1% (.MZP) WinArchiver Mountable compressed Archive (3000/1)
1.4% (.EXE) Win16/32 Executable Delphi generic (2072/23)
File icon (PE):PE icon
dhash icon 08080c1616c240c0 (17 x GCleaner)
Reporter andretavare5
Tags:exe gcleaner


Avatar
andretavare5
Sample downloaded from http://45.12.253.74/pineapple.php?pub=mixinte

Intelligence


File Origin
# of uploads :
1
# of downloads :
194
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
file
Verdict:
Malicious activity
Analysis date:
2023-01-20 02:58:41 UTC
Tags:
installer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a window
Creating a process from a recently created file
Сreating synchronization primitives
Searching for the window
Creating a file in the Program Files subdirectories
Moving a file to the Program Files subdirectory
Modifying a system file
Creating a file in the %AppData% subdirectories
Sending an HTTP GET request
Running batch commands
Creating a process with a hidden window
Using the Windows Management Instrumentation requests
Creating a file in the Windows subdirectories
Launching a tool to kill processes
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckCmdLine
Verdict:
No Threat
Threat level:
  2/10
Confidence:
100%
Tags:
greyware overlay packed shell32.dll
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Cryptbot, Nymaim, Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Detected unpacking (changes PE section rights)
Detected unpacking (creates a PE file in dynamic memory)
Detected unpacking (overwrites its own PE header)
Found C&C like URL pattern
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Obfuscated command line found
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Snort IDS alert for network traffic
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected Cryptbot
Yara detected CryptbotV2
Yara detected Nymaim
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 787985 Sample: file.exe Startdate: 20/01/2023 Architecture: WINDOWS Score: 100 85 45.12.253.98 CMCSUS Germany 2->85 103 Snort IDS alert for network traffic 2->103 105 Malicious sample detected (through community Yara rule) 2->105 107 Antivirus detection for URL or domain 2->107 109 14 other signatures 2->109 13 file.exe 2 2->13         started        signatures3 process4 file5 83 C:\Users\user\AppData\Local\Temp\...\file.tmp, PE32 13->83 dropped 137 Obfuscated command line found 13->137 17 file.tmp 22 16 13->17         started        signatures6 process7 file8 63 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 17->63 dropped 65 C:\Users\user\AppData\Local\...\_iscrypt.dll, PE32 17->65 dropped 67 C:\Users\user\AppData\Local\...\_RegDLL.tmp, PE32 17->67 dropped 69 6 other files (5 malicious) 17->69 dropped 20 finalrecovery.exe 33 17->20         started        process9 dnsIp10 93 45.12.253.56, 49702, 80 CMCSUS Germany 20->93 95 45.12.253.72, 49703, 80 CMCSUS Germany 20->95 97 45.12.253.75, 49704, 49706, 80 CMCSUS Germany 20->97 75 C:\Users\user\AppData\...\7YgqdFx8THPs.exe, PE32 20->75 dropped 77 C:\Users\user\AppData\...\en7QU6qld.exe, MS-DOS 20->77 dropped 79 C:\Users\user\AppData\Roaming\...\5gq290.exe, PE32 20->79 dropped 81 4 other malicious files 20->81 dropped 24 en7QU6qld.exe 20->24         started        27 A0GJ.exe 18 20->27         started        30 5gq290.exe 1 20->30         started        32 3 other processes 20->32 file11 process12 dnsIp13 119 Detected unpacking (changes PE section rights) 24->119 121 Injects a PE file into a foreign processes 24->121 34 en7QU6qld.exe 75 24->34         started        99 65.109.208.140, 49708, 80 ALABANZA-BALTUS United States 27->99 101 t.me 149.154.167.99, 443, 49707 TELEGRAMRU United Kingdom 27->101 123 Multi AV Scanner detection for dropped file 27->123 125 Detected unpacking (creates a PE file in dynamic memory) 27->125 127 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 27->127 129 5 other signatures 27->129 38 WerFault.exe 27->38         started        40 taskkill.exe 1 32->40         started        42 conhost.exe 32->42         started        44 conhost.exe 32->44         started        signatures14 process15 dnsIp16 87 psidik05.top 84.21.172.16, 49713, 80 COMBAHTONcombahtonGmbHDE Germany 34->87 89 quwjmw42.top 84.21.172.161, 49712, 80 COMBAHTONcombahtonGmbHDE Germany 34->89 91 www.google.com 142.250.203.100, 443, 49705 GOOGLEUS United States 34->91 73 C:\Users\user\AppData\Roaming\...\adject.exe, PE32 34->73 dropped 46 cmd.exe 34->46         started        48 cmd.exe 34->48         started        file17 process18 process19 50 adject.exe 46->50         started        54 conhost.exe 46->54         started        56 conhost.exe 48->56         started        58 timeout.exe 48->58         started        file20 71 C:\Users\user\AppData\...\DpEditor.exe, PE32 50->71 dropped 111 Multi AV Scanner detection for dropped file 50->111 113 Query firmware table information (likely to detect VMs) 50->113 115 Hides threads from debuggers 50->115 117 Tries to detect sandboxes / dynamic malware analysis system (registry check) 50->117 60 DpEditor.exe 50->60         started        signatures21 process22 signatures23 131 Query firmware table information (likely to detect VMs) 60->131 133 Hides threads from debuggers 60->133 135 Tries to detect sandboxes / dynamic malware analysis system (registry check) 60->135
Threat name:
Win32.Trojan.Injuke
Status:
Malicious
First seen:
2023-01-20 02:57:07 UTC
File Type:
PE (Exe)
Extracted files:
4
AV detection:
13 of 26 (50.00%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
gcleaner
Score:
  10/10
Tags:
family:gcleaner discovery loader
Behaviour
Kills process with taskkill
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Checks installed software on the system
Checks computer location settings
Loads dropped DLL
Executes dropped EXE
GCleaner
Malware Config
C2 Extraction:
45.12.253.56
45.12.253.72
45.12.253.98
45.12.253.75
Unpacked files
SH256 hash:
91fc73f078f2db8372fe13c1c59ddeeda833ed659df803cdbadcbeb925fba3de
MD5 hash:
99f0311545ea43127d81b168b62b69a2
SHA1 hash:
72b7684251772995df363d5ec7fd60695909eb6c
Detections:
win_nymaim_g0 Nymaim win_gcleaner_auto
SH256 hash:
674f98b7ca5c5f182f76815f24ae9891b0296cbdd93665a3a2556846e7cfe6ba
MD5 hash:
f5b7dbe8afba973ca19f6a0eaddd6b10
SHA1 hash:
adef4992f5df17ca900df0b2613985099624f62b
SH256 hash:
b5bf8ac1406d5c70772531561b618d9e679389d935f4dbf43e0164ab325813bb
MD5 hash:
828a09b69b78450f0e85642392b161bd
SHA1 hash:
38ee7676a05eae8fc5921e9ec7b753c966f3c0fb
SH256 hash:
13623e711bf1f8f66e3a58db1f55183bbb6c3f77f7dda0cda71797fb16b2649f
MD5 hash:
89aadd440c921143d44ab6383d46eaf2
SHA1 hash:
7539e340a99aac4512cd5eeabcdfd05bd32fe1c8
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
Rule name:win_gcleaner_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.gcleaner.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Dropped by
PrivateLoader
  
Delivery method
Distributed via drive-by

Comments