MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 1aa1c747f3d987f9c25cb1e88866915d22b5fb4fc668caf1572e3df2d0e5bf66. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
GCleaner
Vendor detections: 12
| SHA256 hash: | 1aa1c747f3d987f9c25cb1e88866915d22b5fb4fc668caf1572e3df2d0e5bf66 |
|---|---|
| SHA3-384 hash: | d6d3770571a932559178f239612ca8a0d6fede401f25f9bad9951aff7327ed087e81bed7fe98808bb4ed39b860bd4ff5 |
| SHA1 hash: | f93a28136327edad2981c76fc5977efeaaed1ab6 |
| MD5 hash: | 07c5633c282bab7ebd330036ae0771d4 |
| humanhash: | kansas-uncle-queen-harry |
| File name: | 07c5633c282bab7ebd330036ae0771d4.exe |
| Download: | download sample |
| Signature | GCleaner |
| File size: | 7'698'076 bytes |
| First seen: | 2022-03-06 18:55:19 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 101 x GuLoader, 64 x DiamondFox) |
| ssdeep | 196608:JOTOfrpAN7giBsZ+fHL1vptYhMSbPk6jlc7Vtq:JOTarON8cfHL1Bt7SbPHjlc7O |
| Threatray | 6'378 similar samples on MalwareBazaar |
| TLSH | T11776334BA0BCEFBBEDB9C7748E0E44D96D14C60A65265293C23D41213BD777BBA0528C |
| File icon (PE): | |
| dhash icon | b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla) |
| Reporter | |
| Tags: | exe gcleaner |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| 192.236.161.4:443 | https://threatfox.abuse.ch/ioc/392753/ |
Intelligence
File Origin
# of uploads :
1
# of downloads :
301
Origin country :
n/a
Vendor Threat Intelligence
Detection:
DLInjector03
Result
Verdict:
Malware
Maliciousness:
Behaviour
Searching for analyzing tools
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Creating a process with a hidden window
Launching the default Windows debugger (dwwin.exe)
Creating a file in the %temp% directory
Сreating synchronization primitives
Creating a process from a recently created file
Creating a file
Searching for the window
Running batch commands
Launching a process
Searching for synchronization primitives
Creating a window
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Launching a tool to kill processes
Unauthorized injection to a system process
Result
Malware family:
n/a
Score:
5/10
Tags:
n/a
Behaviour
MalwareBazaar
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Socelars
Verdict:
Malicious
Result
Threat name:
RedLine SmokeLoader Socelars onlyLogger
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
Adds a directory exclusion to Windows Defender
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disables Windows Defender (via service or powershell)
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file has a writeable .text section
Sample uses process hollowing technique
Sigma detected: Powershell Defender Base64 MpPreference
Sigma detected: Suspicious Script Execution From Temp Folder
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to evade analysis by execution special instruction which cause usermode exception
Yara detected onlyLogger
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Socelars
Yara detected WebBrowserPassView password recovery tool
Yara Genericmalware
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.QBot
Status:
Malicious
First seen:
2022-03-03 14:13:00 UTC
File Type:
PE (Exe)
Extracted files:
271
AV detection:
33 of 42 (78.57%)
Threat level:
5/5
Detection(s):
Malicious file
Verdict:
malicious
Similar samples:
+ 6'368 additional samples on MalwareBazaar
Result
Malware family:
socelars
Score:
10/10
Tags:
family:onlylogger family:redline family:socelars botnet:media60601 botnet:vnew2 aspackv2 discovery infostealer loader spyware stealer upx
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Kills process with taskkill
Modifies system certificate store
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
ASPack v2.12-2.42
Blocklisted process makes network request
Downloads MZ/PE file
Executes dropped EXE
UPX packed file
OnlyLogger Payload
OnlyLogger
Process spawned unexpected child process
RedLine
RedLine Payload
Socelars
Socelars Payload
Malware Config
C2 Extraction:
https://sa-us-bucket.s3.us-east-2.amazonaws.com/qwwgh/
116.203.252.195:11112
92.255.57.154:11841
116.203.252.195:11112
92.255.57.154:11841
Unpacked files
SH256 hash:
48176b5c6eb7b7f5ee7c120a43b6fcf3036009b1ef06be586c24c8547d80db7b
MD5 hash:
114764a08a68c25265ea017347cd3783
SHA1 hash:
c617005d138d1c86c965d4933fe067ba00f6ad8e
SH256 hash:
e718a2f50e72d94ee2c9455603d98f67e7705aefc283351c182b5e503d59f6d8
MD5 hash:
5264c8567cf762e7cd37971a88b28a45
SHA1 hash:
ffd23a453665086713bbeccf0029c5b026d4c47e
SH256 hash:
706a615ea73af2deaf73464828eb5cbfd3968b5f27da229d0bfc467ab4761058
MD5 hash:
09da18cae6a23d712713b51413cb5bb3
SHA1 hash:
ccb718243aad561945628df9b042d3f2d45e9e8e
SH256 hash:
069ac50992a53edd283b4a4793a5fb1f369af161073a7a51c77b54b11e0bb52c
MD5 hash:
c12f6df4cd6d9d6db407af618fe4709b
SHA1 hash:
ba75f2c1e22d85c0466b83d253de3fb71e07c7bb
SH256 hash:
f03ee501f25d9ec8533756cc2eefe3df9de6bb421c082fec4f714030e58da1d7
MD5 hash:
4107f59dfd33f607566aafe312685123
SHA1 hash:
6239e9577b6d80a858a3f9a582690bac42ca3465
SH256 hash:
37767c9a7b5b604be34fe8ca9e568d39626a4322137a957572fa0bf97d894eda
MD5 hash:
87a05cf4a9d3e961be9d59485081ecb3
SHA1 hash:
4b3f6064c80adb8347425d7f4550c7f1e9d6f3ef
SH256 hash:
abca3ef4971ea9cf196e429902da91fb3f0db2b502ed8dbe33bee639bb4d0b2c
MD5 hash:
e63b0af4990bdfb854b09570164175e1
SHA1 hash:
2363fd653143e88f92e8bc388d7cc5ed28e66ac2
SH256 hash:
7cb44671c2b4bb56f99cde175d969c903a58bbf06104e8ad456419761f264821
MD5 hash:
b653343e5c701720bb92ed19abef4f81
SHA1 hash:
968602dd34add2a908cb07b382438c9e5c131d16
SH256 hash:
e1cc6a9d780602fe6e789bf5c3a27e87e197a4e3bf7c8138ea2f9dfec70fb963
MD5 hash:
f707252b9c9579677fffb013e0cfc646
SHA1 hash:
8ab483023fa8773afb8c13464c39c5b8e687f126
SH256 hash:
e16f68152fa7be7dd8aff55aeff59ddeae48b4b95e3d3ba33016f65e632a6706
MD5 hash:
a8e7034f8220f722f4aca2edcc9c42eb
SHA1 hash:
656d7d88fffd3820deb1741564807990c3851114
SH256 hash:
e8c31ff9250edec13cfad7357b514df64e96079e9916ee1351de83d0c5d26e9e
MD5 hash:
9d6448e01eddb4421294cd5a2321be3b
SHA1 hash:
3a05156ba7d9efb29ef8a102ff493251a82a59f9
SH256 hash:
92f9388dbf6e7d02a298b652079bd966f7c6d31d07d15a16432eb0d72aba802c
MD5 hash:
40ad850ccb36c3f3af55def256c6f5b4
SHA1 hash:
cde0249d6337251c6cc37d51c2db6655894b4895
SH256 hash:
565cb30a640d5cb469f9d93c969aab083fa14dfdf983411c132927665531795c
MD5 hash:
83b531c1515044f8241cd9627fbfbe86
SHA1 hash:
d2f7096e18531abb963fc9af7ecc543641570ac8
SH256 hash:
721d393191597d49d856baef2fbde75e48f52d0465e2cfabf1a41848b0e05589
MD5 hash:
b984a027c8a2abf874f3eb306a831613
SHA1 hash:
d3b3f8890adc840b0bd411cf304eef15d415ed48
Parent samples :
fb9b41efdc7c2d9e8cfda4be223831a9d2f4d21366759da64e04bbbb9e662766
bc9d49f4f0d51c57b34515616d5e6a23a37fec03f8884d8305db0806bd6138fc
ecb96fec4db4a1eecef04c8ef12b260bb419407111c1263664749481b7fa5387
98c920233869ce802fb4722f982fc1a8c2461e2a01ea4a619a9532a660acf285
2fde1682e006e27b2deb49595ab3baf37a836577fbe9efdfae59d4b6b682d8b7
2374069183727dd5904a26027c80032f30dcff60d25019578876c0b37fa9c224
bd3030832602591f05fe01ef11feaa3b9fe776b2a184eb454f02cae3ab73340b
a0f15f4665835bb7f3b07d5e96d2b08af8e88614c9b22fc9fff86f4f60ee1a8e
c91dec1cd5b97079481c76d5d597dde67b60c301ea900eab7db99776d52b465a
bc9d49f4f0d51c57b34515616d5e6a23a37fec03f8884d8305db0806bd6138fc
ecb96fec4db4a1eecef04c8ef12b260bb419407111c1263664749481b7fa5387
98c920233869ce802fb4722f982fc1a8c2461e2a01ea4a619a9532a660acf285
2fde1682e006e27b2deb49595ab3baf37a836577fbe9efdfae59d4b6b682d8b7
2374069183727dd5904a26027c80032f30dcff60d25019578876c0b37fa9c224
bd3030832602591f05fe01ef11feaa3b9fe776b2a184eb454f02cae3ab73340b
a0f15f4665835bb7f3b07d5e96d2b08af8e88614c9b22fc9fff86f4f60ee1a8e
c91dec1cd5b97079481c76d5d597dde67b60c301ea900eab7db99776d52b465a
SH256 hash:
245a869dc8a9bcb2190b5da3ea234740d79798385784e8db7aa3f2d2745192aa
MD5 hash:
4f93004835598b36011104e6f25dbdba
SHA1 hash:
6cb45092356c54f68d26f959e4a05ce80ef28483
SH256 hash:
a7e37f5314834b163fa21557e61c13c0f202fd64d3c0e46e6c90d2d02e033aec
MD5 hash:
6faec01bf7a3d7f5c5dee2e6e3143a58
SHA1 hash:
603a36f817cab5574e58ab279379e5c112e5fb37
SH256 hash:
ae9c5f9770fdcd232a7f0c8341348512810f359b0a1899f14254f5f6fa829257
MD5 hash:
067bc30bd77d326332128a01ed507913
SHA1 hash:
566213717e8a9e8a963dda4760118d9634f06034
SH256 hash:
d39dddafcddb36cc66d0f142547bbde945651757c05a6205df318d5ee342f7a4
MD5 hash:
ac01117d1b037c262094f53114cb779c
SHA1 hash:
6f4f63b4a99562cb02c958fdfb5d55606b3f6db5
SH256 hash:
81a8ead4697f8d94b5015889890bb402f0ec4c25b7b963350204f099356c2fd6
MD5 hash:
d134b81a1f00632a985eef3483ac874c
SHA1 hash:
e385643efd43cf0209687a86ff96b35fe5421a86
SH256 hash:
94b35bd9a378d4e91b32dc30d60af760006faa1feb9957668f76b00e350479ef
MD5 hash:
b50bbe1ccad4035ee187c41a06c0ce00
SHA1 hash:
7359c6ad3185427f239e7e07b8ce20574589fb38
SH256 hash:
804ed4f75c8fd965f18ee4f45ed9a00f3649aa8a4d1106610987b741f0fa5233
MD5 hash:
d4fb6a4e7f033b2df9bc5f8acfe28c3f
SHA1 hash:
1cda574b8c5d230b1cf192f31e1afd9b609602d4
SH256 hash:
33c3c95ecf98bdb89148a2ace64afc9d8d8d894c5f1f040a036da000c4180340
MD5 hash:
ea6adb56cfc38af2d657f1629e76d3bc
SHA1 hash:
3f7a45302db19606ce13d048470130b1623fd626
SH256 hash:
f852184cb5630baf5b1e3b24f178a42db3a83c4000b6893c403f1240210ca590
MD5 hash:
70c1fd6e9171c713a0904b25ce023292
SHA1 hash:
96d2cff7bf277a59c796b5022227cca4517e298c
SH256 hash:
1aa1c747f3d987f9c25cb1e88866915d22b5fb4fc668caf1572e3df2d0e5bf66
MD5 hash:
07c5633c282bab7ebd330036ae0771d4
SHA1 hash:
f93a28136327edad2981c76fc5977efeaaed1ab6
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.