MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 372afb90e481a8a4046b805beaf90d79df0aa95ad8064912763ca5feea026617. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GCleaner


Vendor detections: 16


Intelligence 16 IOCs YARA 3 File information Comments

SHA256 hash: 372afb90e481a8a4046b805beaf90d79df0aa95ad8064912763ca5feea026617
SHA3-384 hash: cde0f50b55681ceb86a9ee67290447f656a213ff7ec03c5ca158b8ad294593720893ed4ecba43d2a749e8138da8e5275
SHA1 hash: 0916a0bda2edd125d2238782498f27bb97ea3eb2
MD5 hash: f4a8c27e4d193cd67587f521162f1eca
humanhash: carbon-stairway-oklahoma-mexico
File name:file
Download: download sample
Signature GCleaner
File size:1'252'966 bytes
First seen:2023-07-01 09:37:10 UTC
Last seen:2023-07-01 10:02:22 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 884310b1928934402ea6fec1dbd3cf5e (3'725 x GCleaner, 3'446 x Socks5Systemz, 262 x RaccoonStealer)
ssdeep 24576:OfOyN11DjhvZB1ldFvvtxh6ZRXDylyqav3ePD1rARpJjBBp/D:OGwnHhvnr7iRDqaOh2pvBp
Threatray 3'477 similar samples on MalwareBazaar
TLSH T1B8452352F5A0AABCF27283B83C68C8314B3A7EBA2EB4541D75D6774D2B37246540FB41
TrID 80.3% (.EXE) Inno Setup installer (109740/4/30)
10.3% (.EXE) Win32 Executable Delphi generic (14182/79/4)
3.2% (.EXE) Win32 Executable (generic) (4505/5/1)
1.5% (.EXE) Win16/32 Executable Delphi generic (2072/23)
1.4% (.EXE) OS/2 Executable (generic) (2029/13)
File icon (PE):PE icon
dhash icon 6070ecc4ccf4ba98 (14 x GCleaner)
Reporter andretavare5
Tags:exe gcleaner


Avatar
andretavare5
Sample downloaded from http://45.12.253.74/pineapple.php?pub=mixinte

Intelligence


File Origin
# of uploads :
2
# of downloads :
292
Origin country :
US US
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
https://bthp.com.pk/download/File_pass1234.7z
Verdict:
Malicious activity
Analysis date:
2023-07-01 09:46:42 UTC
Tags:
privateloader opendir loader rat redline fabookie gcleaner amadey trojan smoke evasion ransomware stop stealer vidar arkei

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a window
Creating a process from a recently created file
Сreating synchronization primitives
Searching for the window
Creating a file in the Program Files subdirectories
Moving a file to the Program Files subdirectory
Launching the process to interact with network services
Modifying a system file
Searching for synchronization primitives
Launching a process
Creating a file in the %AppData% subdirectories
Running batch commands
Creating a process with a hidden window
Launching a tool to kill processes
Sending an HTTP GET request to an infection source
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckCmdLine
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
control greyware installer lolbin overlay packed packed shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Machine Learning detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Nymaim
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 897486 Sample: file.exe Startdate: 01/07/2023 Architecture: WINDOWS Score: 100 40 45.12.253.72 CMCSUS Germany 2->40 42 45.12.253.75 CMCSUS Germany 2->42 44 45.12.253.98 CMCSUS Germany 2->44 48 Found malware configuration 2->48 50 Antivirus detection for URL or domain 2->50 52 Antivirus detection for dropped file 2->52 54 7 other signatures 2->54 9 file.exe 2 2->9         started        signatures3 process4 file5 30 C:\Users\user\AppData\Local\...\is-32T02.tmp, PE32 9->30 dropped 12 is-32T02.tmp 11 102 9->12         started        process6 file7 32 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 12->32 dropped 34 C:\Users\user\AppData\Local\...\_iscrypt.dll, PE32 12->34 dropped 36 C:\...\unins000.exe (copy), PE32 12->36 dropped 38 8 other files (6 malicious) 12->38 dropped 15 ReiSpacer71.exe 8 12->15         started        19 net.exe 1 12->19         started        process8 dnsIp9 46 45.12.253.56, 80 CMCSUS Germany 15->46 28 C:\Users\user\AppData\...\rkmoeVoie.exe, PE32 15->28 dropped 21 rkmoeVoie.exe 15->21         started        24 conhost.exe 19->24         started        26 net1.exe 1 19->26         started        file10 process11 signatures12 56 Multi AV Scanner detection for dropped file 21->56
Threat name:
Win32.Trojan.Privateloader
Status:
Suspicious
First seen:
2023-07-01 09:38:06 UTC
File Type:
PE (Exe)
Extracted files:
5
AV detection:
15 of 24 (62.50%)
Threat level:
  5/5
Result
Malware family:
gcleaner
Score:
  10/10
Tags:
family:gcleaner discovery loader
Behaviour
Kills process with taskkill
Runs net.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Checks installed software on the system
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
GCleaner
Malware Config
C2 Extraction:
45.12.253.56
45.12.253.72
45.12.253.98
45.12.253.75
Unpacked files
SH256 hash:
93308f95be0517595235721ad70abacffa937da0da80c1a9a9511b44d7302339
MD5 hash:
6bf7bf18650b2e136b4742fb1fb1b783
SHA1 hash:
b0bb1a3a964db06b9eae8b82f3ac344d78063757
Detections:
Nymaim win_nymaim_g0 win_gcleaner_auto Nymaim win_nymaim_g0 win_gcleaner_auto Nymaim win_nymaim_g0 win_gcleaner_auto
Parent samples :
0b179afb3c65942dcfcc5de06a8bb6b66b51cbf9b4f82cabebcccafc0da82812
78cd3181da9c97fa0d5e7e9e343a941701d42569c88b370f0200d78321124b63
0b272d2fd0c1f7640576a884d3df70b0e3607952d896fb75381cf95df47594e2
db5eab62f5890af55b7a15cd15409dbadefc00c6084c1c886c5449aa42fdca10
111aa22d9a34a5ade20ba159080e5f2ad3c7e9af9f38fb20a80720735c4d1ede
e1cbe7a4c3837748d08e1521d840acabb9717cf366fe6f7943c0f45bee63df45
8bcecb279d0c333dc40c4739513467252631ef6b826dbd00f210aca0dace7fc2
b50595dd8af7ce4622e5fbfb907e9044c9d7825dd81d74e228e55682d9be8912
3b164096efec61e294b896f7b2fee77ba3aaa48e4b1d89548dc20fe0da2c70cb
8d8bde638b1102ca4a1745b250aaffc8c00325eb7bb337baa7d4c2b2aa553eba
a663f14467779f428b8476d5fe7670cbb67ea97ed3d4b1310c01b3cfaf313d3b
dd1b40ca647bba826a48a96e4c88af689af8171351e44681374e4919dfd9b55a
0ed53b7b14d1ad11cec56933cb9ef328621f89ff1a1a550aada6f8435b3d83d9
a232d928b4814d7eea6a91cdd82b192c8440a51c1303c86dd135321b98abfffd
27b7e29edd59c7d507ffcafb295cc0da7756baf879dc80bf0aff4f8c187ae197
03400314ef928d364ba706d4158f28396c2da5e66a943e2eb40156b59fdf34d0
e3c0de9f2dde3c6d5149b24782d89aaeb7156baa6dba59bef8efde33bfa2fefc
f63ba1a1fc643eecf265cd7a9db2155aee5efd23b84b249f9d642db3979cb086
f8d3fe5dcee59677d1e78766641e8fd4c04dc0b027e73a75229aecb9f85be6fc
34364090eb7448d55caea6c01473df93664f60cfce55d0e6666cc6b385277854
1464acc46c09c24e0b15b76c355a2665a221064dfaf885a75c6b91cafc961785
1f76f90eb1c9018725faadd98f50b98f5869527f7eb64d7b0bf87dc93b92103c
4fa2e40e4f3d1979769b39b358e234db112ba64fa2296234d016052ce59fc225
f09f4dd86be517c48ab02290b004e6bc24025c7234264fcd6f4de22fb0efb605
6189b780f8c199a0157a6894351ce3009c43411fb8f5a205a83de24f3a23385a
66400726158a31f2ae4aaa0a73c684d1df0f73d5ce3d9122e6e5a87021a12293
e3dc16b03ce695935a8748555d63bf2209c8dad8cb85c7d81729f264ce03ffc1
626da43e5e9f4209332a9f0f7ad3680084e5aa481c71bc1ff6d299ac77fb0d75
6b366b8a260b5b203264c53af090f882d29001a9dbf76c8caa42f6bc4a4e0d64
41fd22c8947fb89a86a8d3f32b4ead30bb884bde8f00c66ed23ccef99b125585
bee2251eba48fd551c7bcad485a185f2dc1ef65076bcb6e1c968e8f113cd3fd0
372afb90e481a8a4046b805beaf90d79df0aa95ad8064912763ca5feea026617
135fd5505ae34fedd5139480d1f88551820abb156a67aec7407fab0ca3d197d3
SH256 hash:
e8323f0e599061d3be1930c3a2ed68698946b017378c3b098fa895c091c5ac1b
MD5 hash:
684df6e3338a97a85f7cfbcefeff6f2a
SHA1 hash:
664935c827cb99af9ce9f7ac4224a1f67811ea09
SH256 hash:
6a6dbe8fe82edfef6a5a8271770b2a1279a8fd543ea1753b904a6d2f4d29f179
MD5 hash:
20322206bf3a6c0c0fb0fdc2f2a4239f
SHA1 hash:
88ff09bde25ac62660db0f7cc65c02bd16b8b9bf
SH256 hash:
93308f95be0517595235721ad70abacffa937da0da80c1a9a9511b44d7302339
MD5 hash:
6bf7bf18650b2e136b4742fb1fb1b783
SHA1 hash:
b0bb1a3a964db06b9eae8b82f3ac344d78063757
Detections:
Nymaim win_nymaim_g0 win_gcleaner_auto Nymaim win_nymaim_g0 win_gcleaner_auto Nymaim win_nymaim_g0 win_gcleaner_auto
Parent samples :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 hash:
e8323f0e599061d3be1930c3a2ed68698946b017378c3b098fa895c091c5ac1b
MD5 hash:
684df6e3338a97a85f7cfbcefeff6f2a
SHA1 hash:
664935c827cb99af9ce9f7ac4224a1f67811ea09
SH256 hash:
6a6dbe8fe82edfef6a5a8271770b2a1279a8fd543ea1753b904a6d2f4d29f179
MD5 hash:
20322206bf3a6c0c0fb0fdc2f2a4239f
SHA1 hash:
88ff09bde25ac62660db0f7cc65c02bd16b8b9bf
SH256 hash:
93308f95be0517595235721ad70abacffa937da0da80c1a9a9511b44d7302339
MD5 hash:
6bf7bf18650b2e136b4742fb1fb1b783
SHA1 hash:
b0bb1a3a964db06b9eae8b82f3ac344d78063757
Detections:
Nymaim win_nymaim_g0 win_gcleaner_auto Nymaim win_nymaim_g0 win_gcleaner_auto Nymaim win_nymaim_g0 win_gcleaner_auto
Parent samples :
0b179afb3c65942dcfcc5de06a8bb6b66b51cbf9b4f82cabebcccafc0da82812
78cd3181da9c97fa0d5e7e9e343a941701d42569c88b370f0200d78321124b63
0b272d2fd0c1f7640576a884d3df70b0e3607952d896fb75381cf95df47594e2
db5eab62f5890af55b7a15cd15409dbadefc00c6084c1c886c5449aa42fdca10
111aa22d9a34a5ade20ba159080e5f2ad3c7e9af9f38fb20a80720735c4d1ede
e1cbe7a4c3837748d08e1521d840acabb9717cf366fe6f7943c0f45bee63df45
8bcecb279d0c333dc40c4739513467252631ef6b826dbd00f210aca0dace7fc2
b50595dd8af7ce4622e5fbfb907e9044c9d7825dd81d74e228e55682d9be8912
3b164096efec61e294b896f7b2fee77ba3aaa48e4b1d89548dc20fe0da2c70cb
8d8bde638b1102ca4a1745b250aaffc8c00325eb7bb337baa7d4c2b2aa553eba
a663f14467779f428b8476d5fe7670cbb67ea97ed3d4b1310c01b3cfaf313d3b
dd1b40ca647bba826a48a96e4c88af689af8171351e44681374e4919dfd9b55a
0ed53b7b14d1ad11cec56933cb9ef328621f89ff1a1a550aada6f8435b3d83d9
a232d928b4814d7eea6a91cdd82b192c8440a51c1303c86dd135321b98abfffd
27b7e29edd59c7d507ffcafb295cc0da7756baf879dc80bf0aff4f8c187ae197
03400314ef928d364ba706d4158f28396c2da5e66a943e2eb40156b59fdf34d0
e3c0de9f2dde3c6d5149b24782d89aaeb7156baa6dba59bef8efde33bfa2fefc
f63ba1a1fc643eecf265cd7a9db2155aee5efd23b84b249f9d642db3979cb086
f8d3fe5dcee59677d1e78766641e8fd4c04dc0b027e73a75229aecb9f85be6fc
34364090eb7448d55caea6c01473df93664f60cfce55d0e6666cc6b385277854
1464acc46c09c24e0b15b76c355a2665a221064dfaf885a75c6b91cafc961785
1f76f90eb1c9018725faadd98f50b98f5869527f7eb64d7b0bf87dc93b92103c
4fa2e40e4f3d1979769b39b358e234db112ba64fa2296234d016052ce59fc225
f09f4dd86be517c48ab02290b004e6bc24025c7234264fcd6f4de22fb0efb605
6189b780f8c199a0157a6894351ce3009c43411fb8f5a205a83de24f3a23385a
66400726158a31f2ae4aaa0a73c684d1df0f73d5ce3d9122e6e5a87021a12293
e3dc16b03ce695935a8748555d63bf2209c8dad8cb85c7d81729f264ce03ffc1
626da43e5e9f4209332a9f0f7ad3680084e5aa481c71bc1ff6d299ac77fb0d75
6b366b8a260b5b203264c53af090f882d29001a9dbf76c8caa42f6bc4a4e0d64
41fd22c8947fb89a86a8d3f32b4ead30bb884bde8f00c66ed23ccef99b125585
bee2251eba48fd551c7bcad485a185f2dc1ef65076bcb6e1c968e8f113cd3fd0
372afb90e481a8a4046b805beaf90d79df0aa95ad8064912763ca5feea026617
135fd5505ae34fedd5139480d1f88551820abb156a67aec7407fab0ca3d197d3
SH256 hash:
e8323f0e599061d3be1930c3a2ed68698946b017378c3b098fa895c091c5ac1b
MD5 hash:
684df6e3338a97a85f7cfbcefeff6f2a
SHA1 hash:
664935c827cb99af9ce9f7ac4224a1f67811ea09
SH256 hash:
6a6dbe8fe82edfef6a5a8271770b2a1279a8fd543ea1753b904a6d2f4d29f179
MD5 hash:
20322206bf3a6c0c0fb0fdc2f2a4239f
SHA1 hash:
88ff09bde25ac62660db0f7cc65c02bd16b8b9bf
SH256 hash:
372afb90e481a8a4046b805beaf90d79df0aa95ad8064912763ca5feea026617
MD5 hash:
f4a8c27e4d193cd67587f521162f1eca
SHA1 hash:
0916a0bda2edd125d2238782498f27bb97ea3eb2
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
Rule name:win_gcleaner_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.gcleaner.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Dropped by
PrivateLoader
  
Delivery method
Distributed via drive-by

Comments