MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 323b887c4ebf8da5c2b19cdb2a9216d5ae3c187972a1da09e979e93c85079c22. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GCleaner


Vendor detections: 12


Intelligence 12 IOCs YARA 24 File information Comments

SHA256 hash: 323b887c4ebf8da5c2b19cdb2a9216d5ae3c187972a1da09e979e93c85079c22
SHA3-384 hash: f98bc85ddc5de369724768ba0e046ba21506097015e79b5f10f0ecdfc6aa668f78c2787b09126c8c12f50b3470d48362
SHA1 hash: f5c8454fa8b461bbdde22d45b978dd04faa8b0c0
MD5 hash: c7786f51178d4156e7c0d1ee14171de1
humanhash: ceiling-freddie-whiskey-lima
File name:KMS.exe
Download: download sample
Signature GCleaner
File size:4'711'164 bytes
First seen:2025-06-22 15:43:51 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 7e0a0e8f80bbd1a9c0078e57256f1c3d (5 x GCleaner, 4 x LummaStealer, 3 x CoinMiner)
ssdeep 98304:9TMSyTMe34h1m/t8mjU9poF7vBWTQPELHx1UMo:9TMSCVq1yjU9Y75ZELHx1No
TLSH T1A526DF05F9D34CA9C3A7B2798D236578EB7568634FF08029359F89472F223CC226DE95
TrID 77.3% (.EXE) WinRAR Self Extracting archive (4.x-5.x) (265042/9/39)
12.1% (.EXE) Win32 EXE PECompact compressed (generic) (41569/9/9)
3.0% (.EXE) Win64 Executable (generic) (10522/11/4)
2.9% (.EXE) DOS Borland compiled Executable (generic) (10000/1/2)
1.4% (.EXE) Win16 NE executable (generic) (5038/12/1)
Magika pebin
dhash icon 9494b494d4aeaeac (832 x DCRat, 172 x RedLineStealer, 134 x CryptOne)
Reporter aachum
Tags:exe gcleaner sfx


Avatar
iamaachum
https://file-download.eu/kmspico/ => https://mega.nz/folder/GEkRCKaT#f93dJ6myfe3fENhDS4wqxQ

GCleaner C2: 185.156.72.196

Intelligence


File Origin
# of uploads :
1
# of downloads :
392
Origin country :
ES ES
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
rl_323b887c4ebf8da5c2b19cdb2a9216d5ae3c187972a1da09e979e93c85079c22
Verdict:
Malicious activity
Analysis date:
2025-06-22 15:45:49 UTC
Tags:
gcleaner loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
97.4%
Tags:
delphi emotet cobalt
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Сreating synchronization primitives
Searching for synchronization primitives
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Creating a file
Running batch commands
Launching a process
Launching cmd.exe command interpreter
DNS request
Connection attempt
Sending a custom TCP request
Sending an HTTP GET request to an infection source
Unauthorized injection to a recently created process by context flags manipulation
Connection attempt to an infection source
Result
Threat name:
CryptOne, Socks5Systemz, Tofsee, Xmrig
Detection:
malicious
Classification:
troj.evad.mine
Score:
100 / 100
Signature
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Changes security center settings (notifications, updates, antivirus, firewall)
Creates / moves files in alternative data streams (ADS)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found direct / indirect Syscall (likely to bypass EDR)
Found hidden mapped module (file has been removed from disk)
Found malware configuration
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Passes commands via pipe to a shell (likely to bypass AV or HIPS)
Queries memory information (via WMI often done to detect virtual machines)
Sigma detected: Potentially Suspicious Child Process Of Regsvr32
Sigma detected: Powershell launch regsvr32
Suricata IDS alerts for network traffic
Suspicious powershell command line found
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
Yara detected CryptOne packer
Yara detected Socks5Systemz
Yara detected Tofsee
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1720312 Sample: KMS.exe Startdate: 22/06/2025 Architecture: WINDOWS Score: 100 128 107.37.146.156.bl.spamcop.net 2->128 130 yahoo.com 2->130 132 9 other IPs or domains 2->132 156 Suricata IDS alerts for network traffic 2->156 158 Found malware configuration 2->158 160 Malicious sample detected (through community Yara rule) 2->160 162 13 other signatures 2->162 15 KMS.exe 10 2->15         started        18 svchost.exe 2->18         started        21 svchost.exe 1 1 2->21         started        24 5 other processes 2->24 signatures3 process4 dnsIp5 124 C:\Users\user\AppData\Local\Temp\...\SOFT.exe, PE32 15->124 dropped 26 SOFT.exe 2 15->26         started        30 cmd.exe 1 15->30         started        154 Changes security center settings (notifications, updates, antivirus, firewall) 18->154 32 MpCmdRun.exe 18->32         started        140 127.0.0.1 unknown unknown 21->140 34 regsvr32.exe 24->34         started        file6 signatures7 process8 file9 110 C:\Users\user\AppData\...\svchost015.exe, PE32 26->110 dropped 112 C:\Users\user\AppData\Local\...\svc4A22.tmp, PE32 26->112 dropped 174 Multi AV Scanner detection for dropped file 26->174 176 Writes to foreign memory regions 26->176 178 Found hidden mapped module (file has been removed from disk) 26->178 36 svchost015.exe 31 26->36         started        180 Passes commands via pipe to a shell (likely to bypass AV or HIPS) 30->180 40 cmd.exe 1 30->40         started        42 conhost.exe 30->42         started        44 cmd.exe 1 30->44         started        48 9 other processes 30->48 46 conhost.exe 32->46         started        signatures10 process11 dnsIp12 136 185.156.72.196, 49722, 49723, 49725 ITDELUXE-ASRU Russian Federation 36->136 138 drive.usercontent.google.com 142.250.80.1, 443, 49721 GOOGLEUS United States 36->138 96 C:\Users\user\AppData\...\PsDp8xB8b.exe, PE32 36->96 dropped 98 C:\Users\user\AppData\...\9w9fKOOtSG1zP.exe, PE32+ 36->98 dropped 100 C:\Users\user\AppData\...\51oSwrcTp8.exe, PE32 36->100 dropped 102 3 other malicious files 36->102 dropped 50 PsDp8xB8b.exe 36->50         started        54 51oSwrcTp8.exe 36->54         started        56 9w9fKOOtSG1zP.exe 36->56         started        58 cmd.exe 1 40->58         started        60 cmd.exe 1 40->60         started        file13 process14 file15 86 C:\Users\user\AppData\Local\...\PsDp8xB8b.tmp, PE32 50->86 dropped 164 Multi AV Scanner detection for dropped file 50->164 62 PsDp8xB8b.tmp 50->62         started        88 C:\Users\user\AppData\...\51oSwrcTp8.tmp, PE32 54->88 dropped 65 51oSwrcTp8.tmp 54->65         started        166 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 56->166 168 Queries memory information (via WMI often done to detect virtual machines) 56->168 170 Found direct / indirect Syscall (likely to bypass EDR) 56->170 signatures16 process17 file18 114 C:\Users\user\AppData\Local\...\_shfoldr.dll, PE32 62->114 dropped 116 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 62->116 dropped 118 C:\Users\user\AppData\Local\...\_iscrypt.dll, PE32 62->118 dropped 122 21 other malicious files 62->122 dropped 67 restoringmyfiles467.exe 62->67         started        120 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 65->120 dropped 71 51oSwrcTp8.exe 65->71         started        process19 dnsIp20 134 66.63.187.153 ASN-QUADRANET-GLOBALUS United States 67->134 90 C:\ProgramData\RestoringMyFiles\sqlite3.dll, PE32 67->90 dropped 92 C:\ProgramData\...\RestoringMyFiles.exe, PE32 67->92 dropped 94 C:\Users\user\AppData\...\51oSwrcTp8.tmp, PE32 71->94 dropped 73 51oSwrcTp8.tmp 71->73         started        file21 process22 file23 104 C:\Users\user\AppData\Local\is-5EG1G.tmp, PE32 73->104 dropped 106 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 73->106 dropped 108 C:\Users\user\...\5LightGray_3.pfx (copy), PE32 73->108 dropped 76 regsvr32.exe 73->76         started        process24 process25 78 regsvr32.exe 76->78         started        dnsIp26 142 107.37.146.156.bl.spamcop.net 78->142 144 80.66.75.39 RISS-ASRU Russian Federation 78->144 146 10 other IPs or domains 78->146 126 C:\Users\user:.repos, data 78->126 dropped 148 System process connects to network (likely due to code injection or exploit) 78->148 150 Suspicious powershell command line found 78->150 152 Creates / moves files in alternative data streams (ADS) 78->152 83 powershell.exe 78->83         started        file27 signatures28 process29 signatures30 172 Loading BitLocker PowerShell Module 83->172
Verdict:
inconclusive
YARA:
6 match(es)
Tags:
Executable PE (Portable Executable) Win 64 Exe x64
Threat name:
Win64.Trojan.Vigorf
Status:
Malicious
First seen:
2025-06-22 15:44:34 UTC
File Type:
PE+ (Exe)
Extracted files:
53
AV detection:
19 of 24 (79.17%)
Threat level:
  5/5
Result
Malware family:
gcleaner
Score:
  10/10
Tags:
family:gcleaner discovery loader
Behaviour
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Launches sc.exe
Suspicious use of SetThreadContext
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
GCleaner
Gcleaner family
Verdict:
Informative
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
323b887c4ebf8da5c2b19cdb2a9216d5ae3c187972a1da09e979e93c85079c22
MD5 hash:
c7786f51178d4156e7c0d1ee14171de1
SHA1 hash:
f5c8454fa8b461bbdde22d45b978dd04faa8b0c0
SH256 hash:
2046f265e025776e7199a9e576be5ed49483841f5203c3e3eeb79d0a24f73920
MD5 hash:
e4272fb1e61d3d995eea488931e815af
SHA1 hash:
b90bad3c4a740da4366f62acdad1e22b64da023d
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Base64_decoding
Author:iam-py-test
Description:Detect scripts which are decoding base64 encoded data (mainly Python, may apply to other languages)
Rule name:BatModifier2
Author:Madhav
Description:This is a bat file which is setup a game. 49509
Rule name:Borland
Author:malware-lu
Rule name:botnet_plaintext_c2
Author:cip
Description:Attempts to match at least some of the strings used in some botnet variants which use plaintext communication protocols.
Rule name:CMD_Ping_Localhost
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:detect_powershell
Author:daniyyell
Description:Detects suspicious PowerShell activity related to malware execution
Rule name:Detect_PowerShell_Obfuscation
Author:daniyyell
Description:Detects obfuscated PowerShell commands commonly used in malicious scripts.
Rule name:Detect_Remcos_RAT
Author:daniyyell
Description:Detects Remcos RAT payloads and commands
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:icarus
Author:Michelle Khalil
Description:This rule detects unpacked icarus malware samples.
Rule name:INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC
Author:ditekSHen
Description:Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
Rule name:Jupyter_infostealer
Author:CD_R0M_
Description:Rule for Jupyter Infostealer/Solarmarker malware from september 2021-December 2022
Rule name:NET
Author:malware-lu
Rule name:nuso
Author:Michelle Khalil
Description:This rule detects unpacked nuso malware samples.
Rule name:pe_detect_tls_callbacks
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SelfExtractingRAR
Author:Xavier Mertens
Description:Detects an SFX archive with automatic script execution
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:Suspicious_PS_Strings
Author:Lucas Acha (http://www.lukeacha.com)
Description:observed set of strings which are likely malicious, observed with Jupyter malware.
Reference:http://security5magics.blogspot.com/2020/12/tracking-jupyter-malware.html
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

GCleaner

Executable exe 323b887c4ebf8da5c2b19cdb2a9216d5ae3c187972a1da09e979e93c85079c22

(this sample)

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (FORCE_INTEGRITY)high
Reviews
IDCapabilitiesEvidence
GDI_PLUS_APIInterfaces with Graphicsgdiplus.dll::GdiplusStartup
gdiplus.dll::GdiplusShutdown
gdiplus.dll::GdipAlloc
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CloseHandle
KERNEL32.dll::CreateThread
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryW
KERNEL32.dll::LoadLibraryExA
KERNEL32.dll::LoadLibraryExW
KERNEL32.dll::GetSystemInfo
KERNEL32.dll::GetStartupInfoW
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::AllocConsole
KERNEL32.dll::AttachConsole
KERNEL32.dll::WriteConsoleW
KERNEL32.dll::FreeConsole
KERNEL32.dll::SetStdHandle
KERNEL32.dll::GetConsoleMode
KERNEL32.dll::GetConsoleOutputCP
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateDirectoryW
KERNEL32.dll::CreateHardLinkW
KERNEL32.dll::CreateFileW
KERNEL32.dll::DeleteFileW
KERNEL32.dll::MoveFileW
KERNEL32.dll::MoveFileExW

Comments