MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 3143856c1aa1dd4c1ffcbd7d015c7ffb377ce434590ea4e44423db5778ba685e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
GCleaner
Vendor detections: 12
| SHA256 hash: | 3143856c1aa1dd4c1ffcbd7d015c7ffb377ce434590ea4e44423db5778ba685e |
|---|---|
| SHA3-384 hash: | 98671170f4d03ef2061848e343e739164764e0fd6e6bedc33a84ef53be98a5b3f0b77935c6ed608235fba2f9d90ff07f |
| SHA1 hash: | 4762317e341262c11e40357168e86397703a524c |
| MD5 hash: | b309bbc4c04fbc091f18733f4304d07a |
| humanhash: | pluto-wyoming-mirror-carbon |
| File name: | 3143856C1AA1DD4C1FFCBD7D015C7FFB377CE434590EA.exe |
| Download: | download sample |
| Signature | GCleaner |
| File size: | 16'449'860 bytes |
| First seen: | 2022-03-05 19:45:34 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 32569d67dc210c5cb9a759b08da2bdb3 (122 x RedLineStealer, 42 x DiamondFox, 37 x RaccoonStealer) |
| ssdeep | 393216:xQdg29VdVo8qVuahXqzMoIvwpGrNMH5ojz54R5Lv1hjXX:adggVdVXqV1hX9hvwpGruH6H54/jXX |
| Threatray | 5'934 similar samples on MalwareBazaar |
| TLSH | T143F6336FB90850BDEE0DD13C568CB5678BB6828ADF42C8CE6F44C4481FB8C51765B6B8 |
| File icon (PE): | |
| dhash icon | 848c5454baf47474 (2'088 x Adware.Neoreklami, 101 x RedLineStealer, 33 x DiamondFox) |
| Reporter | |
| Tags: | exe gcleaner |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| 5.45.77.29:2495 | https://threatfox.abuse.ch/ioc/392577/ |
| 37.1.217.131:26250 | https://threatfox.abuse.ch/ioc/392643/ |
Intelligence
File Origin
# of uploads :
1
# of downloads :
321
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a file in the %temp% subdirectories
Сreating synchronization primitives
Creating a process from a recently created file
Searching for the window
Running batch commands
Launching a process
DNS request
Creating a window
Searching for analyzing tools
Sending a custom TCP request
Creating a process with a hidden window
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Sending an HTTP GET request to an infection source
Result
Malware family:
n/a
Score:
5/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckCmdLine
Result
Verdict:
MALICIOUS
Malware family:
Socelars
Verdict:
Malicious
Result
Threat name:
Raccoon RedLine SmokeLoader Socelars Vid
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Antivirus detection for dropped file
Antivirus detection for URL or domain
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disables Windows Defender (via service or powershell)
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
May check the online IP address of the machine
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Query firmware table information (likely to detect VMs)
Sigma detected: Copying Sensitive Files with Credential Data
Sigma detected: MSHTA Spawning Windows Shell
Sigma detected: Powershell Defender Base64 MpPreference
Sigma detected: Suspicious MSHTA Process Patterns
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: Windows Shell File Write to Suspicious Folder
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to evade analysis by execution special instruction which cause usermode exception
Yara detected AntiVM3
Yara detected gzRat
Yara detected onlyLogger
Yara detected Raccoon Stealer
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Socelars
Yara detected Vidar stealer
Yara detected WebBrowserPassView password recovery tool
Yara Genericmalware
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.ArkeiStealer
Status:
Malicious
First seen:
2022-03-03 09:21:43 UTC
File Type:
PE (Exe)
Extracted files:
389
AV detection:
27 of 42 (64.29%)
Threat level:
5/5
Detection(s):
Malicious file
Verdict:
malicious
Similar samples:
+ 5'924 additional samples on MalwareBazaar
Result
Malware family:
socelars
Score:
10/10
Tags:
family:redline family:socelars botnet:03.12_build_3 botnet:@tui botnet:v2user1 aspackv2 evasion infostealer spyware stealer trojan
Behaviour
Kills process with taskkill
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks BIOS information in registry
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
Identifies VirtualBox via ACPI registry values (likely anti-VM)
NirSoft WebBrowserPassView
Nirsoft
Modifies Windows Defender Real-time Protection settings
Process spawned unexpected child process
RedLine
RedLine Payload
Socelars
Socelars Payload
Malware Config
C2 Extraction:
http://www.yarchworkshop.com/
185.215.113.44:23759
45.9.20.221:15590
159.69.246.184:13127
185.215.113.44:23759
45.9.20.221:15590
159.69.246.184:13127
Unpacked files
SH256 hash:
1908cac443610b332e8adfc72481d2a225b72e679ff468d1643782e9c2d96e7c
MD5 hash:
60d12965e7dd763580b316f0743731c6
SHA1 hash:
54b2f29a834a6f9e931a19e3f53c27a132e19c19
SH256 hash:
3d966268571cf0a83f327df99ffd7441ffe65ad098f1db2fff8dd6a5d5233796
MD5 hash:
541501763132091ca1571883622b2c81
SHA1 hash:
17f0073da00f8511abc7b4dd5d018f043c0c5489
SH256 hash:
fdfcbc8cfb57a3451a3d148e50794772d477ed6cc434acc779f1f0dd63e93f4b
MD5 hash:
a6865d7dffcc927d975be63b76147e20
SHA1 hash:
28e7edab84163cc2d0c864820bef89bae6f56bf8
SH256 hash:
2a93372deb6f0605f375845720380f866fe0eecea899ca0c06c70cfa64cc4a93
MD5 hash:
75108a95a87c842b5df4a556be360458
SHA1 hash:
7aa74a8ba315480f32454df3a19c96684b726c6c
SH256 hash:
927de1b2f60813ca5b6e470e637522ca190b742b6a895b3bf65b96051a770ad8
MD5 hash:
a6bd9fd048e5f539f0acd5842f0bc412
SHA1 hash:
bf973ce2426f1c92b7abbdf3c7e68951c413a1a3
SH256 hash:
cf1ed8957d4825743d39f19529138de7131ca8f506440ddc1774f4640dffc599
MD5 hash:
ded1c6e8c89148495fc19734e47b664d
SHA1 hash:
3a444aeacd154f8d66bca8a98615765c25eb3d41
SH256 hash:
63525b0c1ef894632109c3169876b9e2ce728e38ed7f7c574021d5261d56e502
MD5 hash:
ff9b14f4f607a81117cc58916332262e
SHA1 hash:
aed4fe230075f2a067e4ac61fac117aaeb5ef6f9
SH256 hash:
23491f7cfd3e4188496e25651a6e7747549fa02193ed7e28fc5f62df06c1bb46
MD5 hash:
afc39c521ec6a8e19d9138aac3261a81
SHA1 hash:
b774fca05e021f6e21c270a41f5c750023cae001
SH256 hash:
012c3d22b5374c4f595fcf1986bf2a67697f322f36e8bb6456809334f98f5781
MD5 hash:
8bacb64db8fb73308faefd14b863fd43
SHA1 hash:
c5bf54f8b9cc198d6d380f3ee7a74df2feadf32a
SH256 hash:
9dac78cf97a753e813b02cb654f076cdea03155bc9a98ed64ec248729ead52ec
MD5 hash:
29fa5c5ade39d4ae5a0f564949278923
SHA1 hash:
376051004220051779d97fcb44065a8724de370b
SH256 hash:
4e3c72337ad6ede0f71934734ba639a39949c003d7943cb946ea4173b23fd0b7
MD5 hash:
88c2669e0bd058696300a9e233961b93
SHA1 hash:
fdbdc7399faa62ef2d811053a5053cd5d543a24b
SH256 hash:
64a889cf062dcf0234e3f054aa7c51e2011528b442187045455129019b0405de
MD5 hash:
20b8e459d1995783582702b4af57b52d
SHA1 hash:
d65a386ba7a3fa445ebe3aecc2e6b7ae4a346d49
SH256 hash:
eedc6ea4c8ac8e8bc5b174271cbdbca451ae28b1b9fca988c3ea0b92cc9a33bb
MD5 hash:
e1052cd1d7a27c3a6088c12ccc4b14f4
SHA1 hash:
d575240875e1a86cea96f7f2c1862c8f7a39ca27
SH256 hash:
ee2cc85a8e1972a29ce67ab0218d5daa8fc9b67f36111c71eccaf6da05219d19
MD5 hash:
f6271f82a952f96ba9271a4a27c9f22f
SHA1 hash:
d12708b9e39a0cd06add96316b65f1668d6a1246
SH256 hash:
094be53f4a42735fc6f1f3af2952c7508533bbb097855dd691714964c8b13ec5
MD5 hash:
6e60af5f9a0b430b8e6485da31fba0a9
SHA1 hash:
cddb4e0ce1d4671eae8d551697cae9ba45ac2cb4
SH256 hash:
44c8af974e4388c8d6c05109bb7254dec8a54604916c67d48d4117cbdaf08b91
MD5 hash:
ce6143a2e1d62e638cad12dcd1e5cd39
SHA1 hash:
c8b211d626003ec1487c44e7bc8d790e9b90451c
SH256 hash:
b0b0b38ebe52ad3bcd1dd0d84ba87abaa846c7723a1f33688aaaabe4ccf11d6e
MD5 hash:
62217618db55a91a15d4e120e3feefa8
SHA1 hash:
c4f3811809294ed4c9c4d4fece229f31f5f42de1
SH256 hash:
f436fd52b178225d6025040bfc652c9d4f8ef0f54240ee823bd18ea856ce529a
MD5 hash:
14a743692009dbcf6fa50502c3b552c5
SHA1 hash:
a8b7360728391afe940982e0d6143b7b3e7eb780
SH256 hash:
ef6b2b729d17454e1078bea14b8efe57a4a12e588e7afd1c88694b7c65e72fbf
MD5 hash:
1855793ee793f30e6ae7d9454565a6c5
SHA1 hash:
643c1efdbdd43d961875cb5b462149f50f716334
SH256 hash:
c320ef2fcdcfd297fab95f1d50dfc98835f811e5eaad68843b0e8e98422c9da7
MD5 hash:
f407eea7a94872cee1f9c3c6dccd402a
SHA1 hash:
5bdf502809bcd23da10891714de7c2d5df18212d
SH256 hash:
53a13d9b85c62c225f80677e7e84f0e4b3980c0695a7606212176326f2ee72e0
MD5 hash:
ba4548a88c431f3b9e3777e165a62f60
SHA1 hash:
412ca7d19a5bbc44fe0382a59f1bbae0eb1be44d
SH256 hash:
589ec88d8c75c6247183114d817cc7559afdca01522f4802134fb33f7f3ec515
MD5 hash:
cb021068c99f999a307c84627c1a1ca8
SHA1 hash:
100cdd3cd13f3a52887a23cccd521898138d562a
SH256 hash:
3e627ea5a0a3ed72c6f60b3a9c3ee0a2264cc22178ea20aba1cedb43919a60e3
MD5 hash:
ebfee6765c7e448e3ea21b40550d1a70
SHA1 hash:
08464d94727b3a9f523b93ddbaf21191c65214e5
SH256 hash:
a7e37f5314834b163fa21557e61c13c0f202fd64d3c0e46e6c90d2d02e033aec
MD5 hash:
6faec01bf7a3d7f5c5dee2e6e3143a58
SHA1 hash:
603a36f817cab5574e58ab279379e5c112e5fb37
SH256 hash:
93d9ce6291eb10f727da27c487816b29fcba1b907d252f94d11ea0c3a99175fa
MD5 hash:
c7fc3bcb573b112eca27af5ef7192cce
SHA1 hash:
e43a907bdaced88d3c4444844e72d2381e9f1ad7
SH256 hash:
57eeb9e239b58f6c68364e23e4cffa415d532d6fa08ff1f2b7c62bff3ce4a50d
MD5 hash:
7d55389281384fba6215c49e06dd396a
SHA1 hash:
3bb663362f33b3e554854b04ac10b11f02fd5681
SH256 hash:
fd6bbd06c6cdf30b5773720a02c7cd5bc020ae519ea8a4fb2af3d63c156f4b2c
MD5 hash:
a7996ed8e3b7d358c003174cfd949867
SHA1 hash:
1b69d202d5a44907b52b21728b40dfa0f8167658
SH256 hash:
bdd88e0b543fb6ed5f6645d1be3918edb8d73b161ea04d5ad67e520a229a6975
MD5 hash:
31e2dc4bee6523c6a55d2bec8595cc1e
SHA1 hash:
3a23e2d255bb77cb0da7bd3072fb15e98c146fcd
SH256 hash:
951e34ec81545ac04ec0cba8378fceb1295249cb427427768dbf7ff1ba3dd289
MD5 hash:
641f454abab2a57f673896690a8971ea
SHA1 hash:
76583dc1d3d2564637533dd7c9fe6321c74fbb86
SH256 hash:
f6363469f24b3f4feb6ecf9d869dc974106025b9c6851f9d498d3be87e453bc3
MD5 hash:
8cd9eeeda58d3c17170779b7a2b6e31c
SHA1 hash:
6adf8686a3eeee613c72d39d1314374e8158087f
SH256 hash:
92f38f7adc77e4cc62d622f042663f4f7a4d35dc945459b46df1bf5efac96ffe
MD5 hash:
4f516d81ffb146ba0604a5e06c392afe
SHA1 hash:
ae46680f621e1248eb2067848d87c3f1aeb620af
SH256 hash:
ad62badf8dac783939cbd9c417f56f91273c0080c07a549b598473db1f273c39
MD5 hash:
5bf1d2be0b8e67896318fa5a3daa977f
SHA1 hash:
54ce78aa5f4ba5f2773c0edc9d3579cea3867b0a
SH256 hash:
3143856c1aa1dd4c1ffcbd7d015c7ffb377ce434590ea4e44423db5778ba685e
MD5 hash:
b309bbc4c04fbc091f18733f4304d07a
SHA1 hash:
4762317e341262c11e40357168e86397703a524c
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
No further information available
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.