MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1aa1c747f3d987f9c25cb1e88866915d22b5fb4fc668caf1572e3df2d0e5bf66. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GCleaner


Vendor detections: 12


Intelligence 12 IOCs 1 YARA File information Comments

SHA256 hash: 1aa1c747f3d987f9c25cb1e88866915d22b5fb4fc668caf1572e3df2d0e5bf66
SHA3-384 hash: d6d3770571a932559178f239612ca8a0d6fede401f25f9bad9951aff7327ed087e81bed7fe98808bb4ed39b860bd4ff5
SHA1 hash: f93a28136327edad2981c76fc5977efeaaed1ab6
MD5 hash: 07c5633c282bab7ebd330036ae0771d4
humanhash: kansas-uncle-queen-harry
File name:07c5633c282bab7ebd330036ae0771d4.exe
Download: download sample
Signature GCleaner
File size:7'698'076 bytes
First seen:2022-03-06 18:55:19 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 101 x GuLoader, 64 x DiamondFox)
ssdeep 196608:JOTOfrpAN7giBsZ+fHL1vptYhMSbPk6jlc7Vtq:JOTarON8cfHL1Bt7SbPHjlc7O
Threatray 6'378 similar samples on MalwareBazaar
TLSH T11776334BA0BCEFBBEDB9C7748E0E44D96D14C60A65265293C23D41213BD777BBA0528C
File icon (PE):PE icon
dhash icon b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla)
Reporter abuse_ch
Tags:exe gcleaner


Avatar
abuse_ch
GCleaner C2:
192.236.161.4:443

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
192.236.161.4:443 https://threatfox.abuse.ch/ioc/392753/

Intelligence


File Origin
# of uploads :
1
# of downloads :
301
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for analyzing tools
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Creating a process with a hidden window
Launching the default Windows debugger (dwwin.exe)
Creating a file in the %temp% directory
Сreating synchronization primitives
Creating a process from a recently created file
Creating a file
Searching for the window
Running batch commands
Launching a process
Searching for synchronization primitives
Creating a window
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Launching a tool to kill processes
Unauthorized injection to a system process
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine SmokeLoader Socelars onlyLogger
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
Adds a directory exclusion to Windows Defender
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disables Windows Defender (via service or powershell)
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file has a writeable .text section
Sample uses process hollowing technique
Sigma detected: Powershell Defender Base64 MpPreference
Sigma detected: Suspicious Script Execution From Temp Folder
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to evade analysis by execution special instruction which cause usermode exception
Yara detected onlyLogger
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Socelars
Yara detected WebBrowserPassView password recovery tool
Yara Genericmalware
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 583953 Sample: V6hBYPw942.exe Startdate: 06/03/2022 Architecture: WINDOWS Score: 100 70 s3.pl-waw.scw.cloud 151.115.10.1, 49759, 80 OnlineSASFR United Kingdom 2->70 72 20.189.173.20 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 2->72 74 8 other IPs or domains 2->74 90 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->90 92 Malicious sample detected (through community Yara rule) 2->92 94 Antivirus detection for URL or domain 2->94 96 18 other signatures 2->96 12 V6hBYPw942.exe 10 2->12         started        signatures3 process4 file5 60 C:\Users\user\AppData\...\setup_installer.exe, PE32 12->60 dropped 15 setup_installer.exe 22 12->15         started        process6 file7 62 C:\Users\user\AppData\...\setup_install.exe, PE32 15->62 dropped 64 C:\Users\...\621dc22de7f24_Tue061c4bf8c7.exe, PE32 15->64 dropped 66 C:\Users\...\621dc22d94f80_Tue064b2505c.exe, PE32 15->66 dropped 68 17 other files (12 malicious) 15->68 dropped 18 setup_install.exe 1 15->18         started        process8 signatures9 88 Adds a directory exclusion to Windows Defender 18->88 21 cmd.exe 18->21         started        23 cmd.exe 1 18->23         started        25 cmd.exe 18->25         started        27 12 other processes 18->27 process10 signatures11 30 621dc2245ed8a_Tue06dab2d661.exe 21->30         started        33 621dc21a9d00b_Tue0643bee62f8.exe 1 23->33         started        35 621dc227ba5ee_Tue06b4d5945.exe 25->35         started        98 Adds a directory exclusion to Windows Defender 27->98 100 Disables Windows Defender (via service or powershell) 27->100 38 621dc21e31bb4_Tue06eef123.exe 27->38         started        40 621dc21c692fd_Tue06778a36425d.exe 27->40         started        42 621dc2291e397_Tue0635bbe4.exe 27->42         started        45 6 other processes 27->45 process12 dnsIp13 102 Antivirus detection for dropped file 30->102 104 Multi AV Scanner detection for dropped file 30->104 106 Detected unpacking (changes PE section rights) 30->106 124 4 other signatures 30->124 108 Machine Learning detection for dropped file 33->108 110 Disables Windows Defender (via service or powershell) 33->110 47 cmd.exe 33->47         started        76 appwebstat.biz 91.208.206.227, 49755, 80 ALEXHOSTMD unknown 35->76 112 Detected unpacking (overwrites its own PE header) 35->112 114 Found evasive API chain (trying to detect sleep duration tampering with parallel thread) 35->114 78 iplogger.org 148.251.234.83, 443, 49754 HETZNER-ASDE Germany 38->78 80 www.icodeps.com 149.28.253.196, 443, 49752 AS-CHOOPAUS United States 38->80 116 May check the online IP address of the machine 38->116 118 Sample uses process hollowing technique 40->118 82 ip-api.com 208.95.112.1, 49757, 80 TUT-ASUS United States 42->82 84 45.136.151.102 ENZUINC-US Latvia 42->84 52 C:\Users\user\AppData\Local\Temp\11111.exe, PE32 42->52 dropped 86 onenew-cloudapps.com 104.21.79.219, 49753, 80 CLOUDFLARENETUS United States 45->86 54 C:\Users\...\621dc22269a19_Tue067e0b89468.tmp, PE32 45->54 dropped 56 C:\Users\user\AppData\Local\Temp\fN3U.lK6, PE32 45->56 dropped 58 ec28b8f5-6963-4df9-b8c2-bd648280e0bd.exe, PE32 45->58 dropped 120 Obfuscated command line found 45->120 122 Injects a PE file into a foreign processes 45->122 file14 signatures15 process16 signatures17 126 Disables Windows Defender (via service or powershell) 47->126 50 powershell.exe 47->50         started        process18
Threat name:
Win32.Trojan.QBot
Status:
Malicious
First seen:
2022-03-03 14:13:00 UTC
File Type:
PE (Exe)
Extracted files:
271
AV detection:
33 of 42 (78.57%)
Threat level:
  5/5
Result
Malware family:
socelars
Score:
  10/10
Tags:
family:onlylogger family:redline family:socelars botnet:media60601 botnet:vnew2 aspackv2 discovery infostealer loader spyware stealer upx
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Kills process with taskkill
Modifies system certificate store
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
ASPack v2.12-2.42
Blocklisted process makes network request
Downloads MZ/PE file
Executes dropped EXE
UPX packed file
OnlyLogger Payload
OnlyLogger
Process spawned unexpected child process
RedLine
RedLine Payload
Socelars
Socelars Payload
Malware Config
C2 Extraction:
https://sa-us-bucket.s3.us-east-2.amazonaws.com/qwwgh/
116.203.252.195:11112
92.255.57.154:11841
Unpacked files
SH256 hash:
48176b5c6eb7b7f5ee7c120a43b6fcf3036009b1ef06be586c24c8547d80db7b
MD5 hash:
114764a08a68c25265ea017347cd3783
SHA1 hash:
c617005d138d1c86c965d4933fe067ba00f6ad8e
SH256 hash:
e718a2f50e72d94ee2c9455603d98f67e7705aefc283351c182b5e503d59f6d8
MD5 hash:
5264c8567cf762e7cd37971a88b28a45
SHA1 hash:
ffd23a453665086713bbeccf0029c5b026d4c47e
SH256 hash:
706a615ea73af2deaf73464828eb5cbfd3968b5f27da229d0bfc467ab4761058
MD5 hash:
09da18cae6a23d712713b51413cb5bb3
SHA1 hash:
ccb718243aad561945628df9b042d3f2d45e9e8e
SH256 hash:
069ac50992a53edd283b4a4793a5fb1f369af161073a7a51c77b54b11e0bb52c
MD5 hash:
c12f6df4cd6d9d6db407af618fe4709b
SHA1 hash:
ba75f2c1e22d85c0466b83d253de3fb71e07c7bb
SH256 hash:
f03ee501f25d9ec8533756cc2eefe3df9de6bb421c082fec4f714030e58da1d7
MD5 hash:
4107f59dfd33f607566aafe312685123
SHA1 hash:
6239e9577b6d80a858a3f9a582690bac42ca3465
SH256 hash:
37767c9a7b5b604be34fe8ca9e568d39626a4322137a957572fa0bf97d894eda
MD5 hash:
87a05cf4a9d3e961be9d59485081ecb3
SHA1 hash:
4b3f6064c80adb8347425d7f4550c7f1e9d6f3ef
SH256 hash:
abca3ef4971ea9cf196e429902da91fb3f0db2b502ed8dbe33bee639bb4d0b2c
MD5 hash:
e63b0af4990bdfb854b09570164175e1
SHA1 hash:
2363fd653143e88f92e8bc388d7cc5ed28e66ac2
SH256 hash:
7cb44671c2b4bb56f99cde175d969c903a58bbf06104e8ad456419761f264821
MD5 hash:
b653343e5c701720bb92ed19abef4f81
SHA1 hash:
968602dd34add2a908cb07b382438c9e5c131d16
SH256 hash:
e1cc6a9d780602fe6e789bf5c3a27e87e197a4e3bf7c8138ea2f9dfec70fb963
MD5 hash:
f707252b9c9579677fffb013e0cfc646
SHA1 hash:
8ab483023fa8773afb8c13464c39c5b8e687f126
SH256 hash:
e16f68152fa7be7dd8aff55aeff59ddeae48b4b95e3d3ba33016f65e632a6706
MD5 hash:
a8e7034f8220f722f4aca2edcc9c42eb
SHA1 hash:
656d7d88fffd3820deb1741564807990c3851114
SH256 hash:
e8c31ff9250edec13cfad7357b514df64e96079e9916ee1351de83d0c5d26e9e
MD5 hash:
9d6448e01eddb4421294cd5a2321be3b
SHA1 hash:
3a05156ba7d9efb29ef8a102ff493251a82a59f9
SH256 hash:
92f9388dbf6e7d02a298b652079bd966f7c6d31d07d15a16432eb0d72aba802c
MD5 hash:
40ad850ccb36c3f3af55def256c6f5b4
SHA1 hash:
cde0249d6337251c6cc37d51c2db6655894b4895
SH256 hash:
565cb30a640d5cb469f9d93c969aab083fa14dfdf983411c132927665531795c
MD5 hash:
83b531c1515044f8241cd9627fbfbe86
SHA1 hash:
d2f7096e18531abb963fc9af7ecc543641570ac8
SH256 hash:
245a869dc8a9bcb2190b5da3ea234740d79798385784e8db7aa3f2d2745192aa
MD5 hash:
4f93004835598b36011104e6f25dbdba
SHA1 hash:
6cb45092356c54f68d26f959e4a05ce80ef28483
SH256 hash:
a7e37f5314834b163fa21557e61c13c0f202fd64d3c0e46e6c90d2d02e033aec
MD5 hash:
6faec01bf7a3d7f5c5dee2e6e3143a58
SHA1 hash:
603a36f817cab5574e58ab279379e5c112e5fb37
SH256 hash:
ae9c5f9770fdcd232a7f0c8341348512810f359b0a1899f14254f5f6fa829257
MD5 hash:
067bc30bd77d326332128a01ed507913
SHA1 hash:
566213717e8a9e8a963dda4760118d9634f06034
SH256 hash:
d39dddafcddb36cc66d0f142547bbde945651757c05a6205df318d5ee342f7a4
MD5 hash:
ac01117d1b037c262094f53114cb779c
SHA1 hash:
6f4f63b4a99562cb02c958fdfb5d55606b3f6db5
SH256 hash:
81a8ead4697f8d94b5015889890bb402f0ec4c25b7b963350204f099356c2fd6
MD5 hash:
d134b81a1f00632a985eef3483ac874c
SHA1 hash:
e385643efd43cf0209687a86ff96b35fe5421a86
SH256 hash:
94b35bd9a378d4e91b32dc30d60af760006faa1feb9957668f76b00e350479ef
MD5 hash:
b50bbe1ccad4035ee187c41a06c0ce00
SHA1 hash:
7359c6ad3185427f239e7e07b8ce20574589fb38
SH256 hash:
804ed4f75c8fd965f18ee4f45ed9a00f3649aa8a4d1106610987b741f0fa5233
MD5 hash:
d4fb6a4e7f033b2df9bc5f8acfe28c3f
SHA1 hash:
1cda574b8c5d230b1cf192f31e1afd9b609602d4
SH256 hash:
33c3c95ecf98bdb89148a2ace64afc9d8d8d894c5f1f040a036da000c4180340
MD5 hash:
ea6adb56cfc38af2d657f1629e76d3bc
SHA1 hash:
3f7a45302db19606ce13d048470130b1623fd626
SH256 hash:
f852184cb5630baf5b1e3b24f178a42db3a83c4000b6893c403f1240210ca590
MD5 hash:
70c1fd6e9171c713a0904b25ce023292
SHA1 hash:
96d2cff7bf277a59c796b5022227cca4517e298c
SH256 hash:
1aa1c747f3d987f9c25cb1e88866915d22b5fb4fc668caf1572e3df2d0e5bf66
MD5 hash:
07c5633c282bab7ebd330036ae0771d4
SHA1 hash:
f93a28136327edad2981c76fc5977efeaaed1ab6
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments