MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 236dad58970dbb32df7df1c6e317cf5c2a4cba4ec44e872542d926c709026f6c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GCleaner


Vendor detections: 13


Intelligence 13 IOCs 2 YARA 20 File information Comments

SHA256 hash: 236dad58970dbb32df7df1c6e317cf5c2a4cba4ec44e872542d926c709026f6c
SHA3-384 hash: b99fec96c0a2f6fbd79365ea30db6a2fb4bf98ccb18183bdd200c18cfd43718b310954e1bcc3a12fbbd1014cbef84b56
SHA1 hash: 30dc549e6b511a6a9136f248c0d2cfb53407bf9e
MD5 hash: ab452564344e23b7e08c7da771c61548
humanhash: oscar-west-robert-king
File name:ab452564344e23b7e08c7da771c61548.exe
Download: download sample
Signature GCleaner
File size:17'382'091 bytes
First seen:2021-12-14 22:44:40 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 101 x GuLoader, 64 x DiamondFox)
ssdeep 393216:JOJdS+D5UuNxtUW13jLtdA/4fnz+1cTpNaw11mD1FY:JOJk+9zXtUW93tdA/4fny1cTa6mD1S
Threatray 805 similar samples on MalwareBazaar
TLSH T13D0733B56F2F0DAAC89207710364DDFF50A2110E1D4221FAE4EF9DF0F46AAC23695799
File icon (PE):PE icon
dhash icon b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla)
Reporter abuse_ch
Tags:exe gcleaner


Avatar
abuse_ch
GCleaner C2:
http://159.69.92.223/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://159.69.92.223/ https://threatfox.abuse.ch/ioc/275517/
159.69.246.184:13127 https://threatfox.abuse.ch/ioc/275791/

Intelligence


File Origin
# of uploads :
1
# of downloads :
216
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
ab452564344e23b7e08c7da771c61548.exe
Verdict:
No threats detected
Analysis date:
2021-12-14 22:46:00 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %temp% directory
Сreating synchronization primitives
Creating a process from a recently created file
Creating a file
Running batch commands
Launching a process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
barys overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Raccoon RedLine SmokeLoader Socelars Vid
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Contain functionality to detect virtual machines
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender real time protection (registry)
Disables Windows Defender (via service or powershell)
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Query firmware table information (likely to detect VMs)
Sigma detected: Copying Sensitive Files with Credential Data
Sigma detected: MSHTA Spawning Windows Shell
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious MSHTA Process Patterns
Sigma detected: Suspicious Script Execution From Temp Folder
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to evade analysis by execution special instruction which cause usermode exception
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected Raccoon Stealer
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Socelars
Yara detected Vidar stealer
Yara detected WebBrowserPassView password recovery tool
Yara Genericmalware
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 539959 Sample: tGLMnAEvJN.exe Startdate: 14/12/2021 Architecture: WINDOWS Score: 100 68 208.95.112.1 TUT-ASUS United States 2->68 70 116.202.14.219 HETZNER-ASDE Germany 2->70 72 4 other IPs or domains 2->72 90 Antivirus detection for URL or domain 2->90 92 Antivirus detection for dropped file 2->92 94 Antivirus / Scanner detection for submitted sample 2->94 96 25 other signatures 2->96 11 tGLMnAEvJN.exe 10 2->11         started        signatures3 process4 file5 50 C:\Users\user\AppData\...\setup_installer.exe, PE32 11->50 dropped 14 setup_installer.exe 29 11->14         started        process6 file7 52 C:\Users\user\AppData\...\setup_install.exe, PE32 14->52 dropped 54 C:\Users\user\...\Sun13f80f86b84c5.exe, PE32 14->54 dropped 56 C:\Users\user\...\Sun13d6c5301563fc14.exe, PE32 14->56 dropped 58 24 other files (16 malicious) 14->58 dropped 17 setup_install.exe 1 14->17         started        process8 signatures9 86 Adds a directory exclusion to Windows Defender 17->86 88 Disables Windows Defender (via service or powershell) 17->88 20 cmd.exe 1 17->20         started        22 cmd.exe 17->22         started        24 cmd.exe 1 17->24         started        26 12 other processes 17->26 process10 signatures11 29 Sun138aef9bbf0b2.exe 20->29         started        34 Sun1351693eb53e1.exe 22->34         started        36 Sun138c12c52ab5de5.exe 2 24->36         started        98 Adds a directory exclusion to Windows Defender 26->98 100 Disables Windows Defender (via service or powershell) 26->100 38 Sun13f80f86b84c5.exe 26->38         started        40 Sun13d6c5301563fc14.exe 26->40         started        42 Sun13ae63616e.exe 26->42         started        44 6 other processes 26->44 process12 dnsIp13 74 185.215.113.208 WHOLESALECONNECTIONSNL Portugal 29->74 76 212.193.30.29 SPD-NETTR Russian Federation 29->76 82 15 other IPs or domains 29->82 60 C:\Users\user\AppData\...\soft500eu[1].exe, PE32 29->60 dropped 62 C:\Users\user\AppData\Local\...\setup[1].exe, PE32 29->62 dropped 64 C:\Users\user\AppData\...\search21[1].exe, PE32 29->64 dropped 66 26 other files (6 malicious) 29->66 dropped 102 Creates HTML files with .exe extension (expired dropper behavior) 29->102 104 Machine Learning detection for dropped file 29->104 126 2 other signatures 29->126 78 149.154.167.99 TELEGRAMRU United Kingdom 34->78 80 91.219.236.27 SERVERASTRA-ASHU Hungary 34->80 84 4 other IPs or domains 34->84 106 Query firmware table information (likely to detect VMs) 34->106 108 Tries to detect sandboxes and other dynamic analysis tools (window names) 34->108 110 Tries to evade analysis by execution special instruction which cause usermode exception 34->110 112 Detected unpacking (changes PE section rights) 36->112 114 Detected unpacking (overwrites its own PE header) 36->114 116 Tries to detect sandboxes / dynamic malware analysis system (registry check) 36->116 118 Hides threads from debuggers 38->118 120 Contain functionality to detect virtual machines 40->120 122 Injects a PE file into a foreign processes 42->122 46 Sun13ae63616e.exe 42->46         started        124 Adds a directory exclusion to Windows Defender 44->124 48 mshta.exe 44->48         started        file14 signatures15 process16
Threat name:
Win32.Trojan.Cryprar
Status:
Malicious
First seen:
2021-12-13 03:54:00 UTC
AV detection:
19 of 28 (67.86%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:raccoon family:redline family:socelars family:vidar botnet:4da27d123a577c68e42716053343dd3f8da508a2 aspackv2 evasion infostealer stealer trojan
Behaviour
Delays execution with timeout.exe
Kills process with taskkill
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Looks up geolocation information via web service
Checks BIOS information in registry
Loads dropped DLL
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
Identifies VirtualBox via ACPI registry values (likely anti-VM)
NirSoft WebBrowserPassView
Nirsoft
Process spawned unexpected child process
Raccoon
RedLine
RedLine Payload
Socelars
Socelars Payload
Vidar
Malware Config
C2 Extraction:
http://www.yarchworkshop.com/
Unpacked files
SH256 hash:
1908cac443610b332e8adfc72481d2a225b72e679ff468d1643782e9c2d96e7c
MD5 hash:
60d12965e7dd763580b316f0743731c6
SHA1 hash:
54b2f29a834a6f9e931a19e3f53c27a132e19c19
SH256 hash:
23491f7cfd3e4188496e25651a6e7747549fa02193ed7e28fc5f62df06c1bb46
MD5 hash:
afc39c521ec6a8e19d9138aac3261a81
SHA1 hash:
b774fca05e021f6e21c270a41f5c750023cae001
SH256 hash:
cf1ed8957d4825743d39f19529138de7131ca8f506440ddc1774f4640dffc599
MD5 hash:
ded1c6e8c89148495fc19734e47b664d
SHA1 hash:
3a444aeacd154f8d66bca8a98615765c25eb3d41
SH256 hash:
6851e02d3f4b8179b975f00bbc86602a2f2f84524f548876eb656db7ea5eaa9c
MD5 hash:
c5124caf4aea3a83b63a9108fe0dcef8
SHA1 hash:
a43a5a59038fca5a63fa526277f241f855177ce6
SH256 hash:
3bb55b0de90de0cc651dba71c869675c4fb5cfd1b9b21bd4957f1680f7506f06
MD5 hash:
f9d056f1d085e83a64c8ef2ba5f3be52
SHA1 hash:
bf04d73f991d0e45d459a5341593524e4e498801
SH256 hash:
b19104b568ca3ddccc2a8d3d10ecddb1ea240171e798dc3a486292cfa14b6365
MD5 hash:
7b0900da932f4ed9630d65b04422736d
SHA1 hash:
6fa340436e3a8e73ae2b3e911f861483183c68ef
SH256 hash:
2a93372deb6f0605f375845720380f866fe0eecea899ca0c06c70cfa64cc4a93
MD5 hash:
75108a95a87c842b5df4a556be360458
SHA1 hash:
7aa74a8ba315480f32454df3a19c96684b726c6c
SH256 hash:
63525b0c1ef894632109c3169876b9e2ce728e38ed7f7c574021d5261d56e502
MD5 hash:
ff9b14f4f607a81117cc58916332262e
SHA1 hash:
aed4fe230075f2a067e4ac61fac117aaeb5ef6f9
SH256 hash:
9dac78cf97a753e813b02cb654f076cdea03155bc9a98ed64ec248729ead52ec
MD5 hash:
29fa5c5ade39d4ae5a0f564949278923
SHA1 hash:
376051004220051779d97fcb44065a8724de370b
SH256 hash:
93d9ce6291eb10f727da27c487816b29fcba1b907d252f94d11ea0c3a99175fa
MD5 hash:
c7fc3bcb573b112eca27af5ef7192cce
SHA1 hash:
e43a907bdaced88d3c4444844e72d2381e9f1ad7
SH256 hash:
fdfcbc8cfb57a3451a3d148e50794772d477ed6cc434acc779f1f0dd63e93f4b
MD5 hash:
a6865d7dffcc927d975be63b76147e20
SHA1 hash:
28e7edab84163cc2d0c864820bef89bae6f56bf8
SH256 hash:
3d966268571cf0a83f327df99ffd7441ffe65ad098f1db2fff8dd6a5d5233796
MD5 hash:
541501763132091ca1571883622b2c81
SHA1 hash:
17f0073da00f8511abc7b4dd5d018f043c0c5489
SH256 hash:
4e3c72337ad6ede0f71934734ba639a39949c003d7943cb946ea4173b23fd0b7
MD5 hash:
88c2669e0bd058696300a9e233961b93
SHA1 hash:
fdbdc7399faa62ef2d811053a5053cd5d543a24b
SH256 hash:
e872344ca4c82587001c1fe3dc69d48c400d77f7b4a1542632ee95e41621025d
MD5 hash:
6b4d4262afc607f1a75e82823d98f5c0
SHA1 hash:
ec58dff2695e23d9521dc9810bdfea2ebfb01db6
SH256 hash:
f8a6b5c40eebd5971f089f41609ddec66770c8e90add31e61e02b70728be1bc7
MD5 hash:
1d8d3a4f18df557804010ac41b5f52ba
SHA1 hash:
d77a73fb2e8d75a60653ed6f0570e98fc2fb8696
SH256 hash:
eedc6ea4c8ac8e8bc5b174271cbdbca451ae28b1b9fca988c3ea0b92cc9a33bb
MD5 hash:
e1052cd1d7a27c3a6088c12ccc4b14f4
SHA1 hash:
d575240875e1a86cea96f7f2c1862c8f7a39ca27
SH256 hash:
ee2cc85a8e1972a29ce67ab0218d5daa8fc9b67f36111c71eccaf6da05219d19
MD5 hash:
f6271f82a952f96ba9271a4a27c9f22f
SHA1 hash:
d12708b9e39a0cd06add96316b65f1668d6a1246
SH256 hash:
629aa24c705aee53f5d2a86fa19919cc30a71ed070e56337e77d3fb33d651558
MD5 hash:
7e380692d499811055c77a150fa3183f
SHA1 hash:
b38d576ea097e1f6cedd4797dfd7f7433ce44eb3
SH256 hash:
ef6b2b729d17454e1078bea14b8efe57a4a12e588e7afd1c88694b7c65e72fbf
MD5 hash:
1855793ee793f30e6ae7d9454565a6c5
SHA1 hash:
643c1efdbdd43d961875cb5b462149f50f716334
SH256 hash:
15653544e12d3a8f519b417a5b564ce4c809706d0f4783af1794f058c70598a1
MD5 hash:
d6b9cc1383295e3fcb7fe6436ddf7a29
SHA1 hash:
56ee2e7f93f98dd502f0efd62150581ad3f620ce
SH256 hash:
fd7fe007b269c3c5e93578dcf89c44bd8c7fc079b5dae2d908f70d8696e0a36a
MD5 hash:
d3c6f332f36cd600378686e55521a9a8
SHA1 hash:
5232f6d4be309fc309792034fa7aeffe486b6345
SH256 hash:
53a13d9b85c62c225f80677e7e84f0e4b3980c0695a7606212176326f2ee72e0
MD5 hash:
ba4548a88c431f3b9e3777e165a62f60
SHA1 hash:
412ca7d19a5bbc44fe0382a59f1bbae0eb1be44d
SH256 hash:
849e50b581c131782a4f3da0f7f91dd556d6af641286674d54412d7f21a12c45
MD5 hash:
f9b885751392545ffaf76276a1ab430f
SHA1 hash:
3f130be9af66f7ea4642211cb380f8416b06023e
SH256 hash:
3e627ea5a0a3ed72c6f60b3a9c3ee0a2264cc22178ea20aba1cedb43919a60e3
MD5 hash:
ebfee6765c7e448e3ea21b40550d1a70
SHA1 hash:
08464d94727b3a9f523b93ddbaf21191c65214e5
SH256 hash:
927de1b2f60813ca5b6e470e637522ca190b742b6a895b3bf65b96051a770ad8
MD5 hash:
a6bd9fd048e5f539f0acd5842f0bc412
SHA1 hash:
bf973ce2426f1c92b7abbdf3c7e68951c413a1a3
SH256 hash:
a7e37f5314834b163fa21557e61c13c0f202fd64d3c0e46e6c90d2d02e033aec
MD5 hash:
6faec01bf7a3d7f5c5dee2e6e3143a58
SHA1 hash:
603a36f817cab5574e58ab279379e5c112e5fb37
SH256 hash:
6c1227abab764e2c09da025002db52a8b765466f68c728faef4169ac57295132
MD5 hash:
1e371d142da4c8b0ea5afdda44f77bd5
SHA1 hash:
32ff34e7d74f95e899a4ab75fbb9f1c0b8a1a771
SH256 hash:
1ad054bfb861f5e4b2e922894d1d6e456f1ba5d3b5427b44e5f196cd1ff3cef9
MD5 hash:
70e8ff0699492aa8174231f278daf931
SHA1 hash:
286289bef9f07f30efb3c3d9b2834f71c7db4960
SH256 hash:
b7dead00e16369cda3fe16b11f0a87876e1f7d65ce56c029e0a9b626eeee17e3
MD5 hash:
d40c5545eb13043e717e1270f7d9a16d
SHA1 hash:
11b51423802feafd0c5203180381b1d2999c6716
SH256 hash:
ee626dc61d5abd80cd0653861abe3d5ae19be4d85706a4b1bdd2be008befdade
MD5 hash:
1823237cb1e843c20f6427bb07a22710
SHA1 hash:
c4dd1c736f5372b9b2394b3070768b71d7c691c1
SH256 hash:
02001cb553dbbf2da07c28f9d05aa832b68e673c493e9b7e905c2fd1c0e60f64
MD5 hash:
d2daa91b64410a36e22207d8a02bac4a
SHA1 hash:
451dd01114a83c3312bf8609cb2b16637ead2a1c
SH256 hash:
a61ab625b2859b37c784d492813d86f3e90f781b902ef50e867c9988accadd56
MD5 hash:
e4487c3839db2e61d46cab7079f06df2
SHA1 hash:
44b0b58f0e90f3b4d6bd2ef39c2db6092671b136
SH256 hash:
247dd01d5b62b45d692c1475bf809818c285c9cda76f5e4fbfcd90147a5273e9
MD5 hash:
7ff745567830f61108c65e78ebc8a3cd
SHA1 hash:
f4b52734d4e761301c488ddcd73b0fb690b36cda
SH256 hash:
17eba5a8fc60b5e62fbbea29e971691988da98a98db3a2c2bf9aad00b1b72dc4
MD5 hash:
e74d9b73743dfbb9f025a7908c85da37
SHA1 hash:
8a5b323b090cb0d2c4ff59f0ef520d323dd86097
SH256 hash:
ca3c2d718527e2c0ac1156625083e205bd7bda39fc1560ab496bcf1684b31ac3
MD5 hash:
de26c643a9c1c4e090b19c4100b59e7e
SHA1 hash:
103b58ec2ac1d072943a40583362278cf12cd0d7
SH256 hash:
236dad58970dbb32df7df1c6e317cf5c2a4cba4ec44e872542d926c709026f6c
MD5 hash:
ab452564344e23b7e08c7da771c61548
SHA1 hash:
30dc549e6b511a6a9136f248c0d2cfb53407bf9e
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:crime_ZZ_botnet_aicm
Author:imp0rtp3
Description:DDoS Golang Botnet sample for linux called 'aicm'
Reference:https://twitter.com/IntezerLabs/status/1401869234511175683
Rule name:Glupteba
Rule name:GoBinTest
Rule name:golang
Rule name:grakate_stealer_nov_2021
Rule name:identity_golang
Author:Eric Yocam
Description:find Golang malware
Rule name:INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA
Author:ditekSHen
Description:Detects Windows executables referencing non-Windows User-Agents
Rule name:INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL
Author:ditekSHen
Description:Detects executables containing URLs to raw contents of a Github gist
Rule name:INDICATOR_SUSPICIOUS_EXE_References_CryptoWallets
Author:ditekSHen
Description:Detects executables referencing many cryptocurrency mining wallets or apps. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA
Author:ditekSHen
Description:Detects executables referencing many varying, potentially fake Windows User-Agents
Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:MALWARE_Win_DLInjector06
Author:ditekSHen
Description:Detects downloader / injector
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:MALWARE_Win_Vidar
Author:ditekSHen
Description:Detects Vidar / ArkeiStealer
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:UroburosVirtualBoxDriver
Rule name:Vidar
Author:kevoreilly
Description:Vidar Payload

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments