MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3d93d1e45579a47c3a3425fd16319c5a004396a2d98b7cf170ed009dad29c247. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GCleaner


Vendor detections: 13


Intelligence 13 IOCs 5 YARA 8 File information Comments

SHA256 hash: 3d93d1e45579a47c3a3425fd16319c5a004396a2d98b7cf170ed009dad29c247
SHA3-384 hash: c58e2f6a6154a6fcd2074963e0b002c5291f7846950717b7e2ef6922f7e60700ec333760c55ca7d1018d7893be50d382
SHA1 hash: affc2a67755549665a57d51c3c8767992ff20557
MD5 hash: 666b2557bae9f06363a55e64fe992f17
humanhash: kansas-earth-oscar-alabama
File name:666b2557bae9f06363a55e64fe992f17.exe
Download: download sample
Signature GCleaner
File size:6'947'053 bytes
First seen:2021-08-09 02:05:26 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash fcf1390e9ce472c7270447fc5c61a0c1 (863 x DCRat, 118 x NanoCore, 94 x njrat)
ssdeep 196608:UyKUxHgATdA8rsvku1kq2SuLgsn2bMlCnahYF7pS0ir:IUGYTI0VL2bM0KMg
Threatray 245 similar samples on MalwareBazaar
TLSH T1316633427AC19572C5665E3649B4B621AD7C3C300E74C5DFA3A81659CB3F0D2EF32AA3
dhash icon 9494b494d4aeaeac (832 x DCRat, 172 x RedLineStealer, 134 x CryptOne)
Reporter abuse_ch
Tags:exe gcleaner


Avatar
abuse_ch
GCleaner C2:
http://74.119.195.134/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://74.119.195.134/ https://threatfox.abuse.ch/ioc/166044/
5.8.248.83:61808 https://threatfox.abuse.ch/ioc/166048/
45.14.49.68:43238 https://threatfox.abuse.ch/ioc/166049/
http://gcc-prtnrs.top/dlc/distribution.php https://threatfox.abuse.ch/ioc/166056/
http://gcc-prtnrs.top/stats/remember.php https://threatfox.abuse.ch/ioc/166057/

Intelligence


File Origin
# of uploads :
1
# of downloads :
133
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
666b2557bae9f06363a55e64fe992f17.exe
Verdict:
Malicious activity
Analysis date:
2021-08-09 02:07:05 UTC
Tags:
autoit evasion

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Searching for the window
Creating a file in the Windows subdirectories
Creating a process from a recently created file
Creating a file in the %temp% subdirectories
Launching a process
DNS request
Connection attempt
Sending a custom TCP request
Creating a file
Sending an HTTP GET request
Launching the default Windows debugger (dwwin.exe)
Using the Windows Management Instrumentation requests
Deleting a recently created file
Sending a UDP request
Running batch commands
Creating a process with a hidden window
Moving a file to the %temp% subdirectory
Changing a file
Reading critical registry keys
Sending an HTTP POST request
Replacing files
Possible injection to a system process
Unauthorized injection to a recently created process
Connection attempt to an infection source
Query of malicious DNS domain
Sending a TCP request to an infection source
Launching a tool to kill processes
Stealing user critical data
Blocking the Windows Defender launch
Unauthorized injection to a system process
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine SmokeLoader Socelars Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large strings
.NET source code references suspicious native API functions
Antivirus detection for URL or domain
Binary is likely a compiled AutoIt script file
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates processes via WMI
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Detected VMProtect packer
Disable Windows Defender real time protection (registry)
DLL reload attack detected
Drops PE files to the document folder of the user
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has nameless sections
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Renames NTDLL to bypass HIPS
Sample is protected by VMProtect
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Socelars
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 461351 Sample: ApGpa5we7X.exe Startdate: 09/08/2021 Architecture: WINDOWS Score: 100 170 Antivirus detection for URL or domain 2->170 172 Multi AV Scanner detection for dropped file 2->172 174 Multi AV Scanner detection for submitted file 2->174 176 13 other signatures 2->176 11 ApGpa5we7X.exe 1 28 2->11         started        process3 file4 96 C:\Users\user\Desktop\pub2.exe, PE32 11->96 dropped 98 C:\Users\user\Desktop\jg3_3uag.exe, PE32 11->98 dropped 100 C:\Users\user\Desktop\Installation.exe, PE32 11->100 dropped 102 5 other files (3 malicious) 11->102 dropped 14 Info.exe 11->14         started        19 Installation.exe 11->19         started        21 pub2.exe 11->21         started        23 6 other processes 11->23 process5 dnsIp6 134 136.144.41.201 WORLDSTREAMNL Netherlands 14->134 136 37.0.10.236 WKD-ASIE Netherlands 14->136 142 12 other IPs or domains 14->142 104 C:\Users\...\zwruArG988eTqOWHXeE9keSu.exe, PE32 14->104 dropped 106 C:\Users\...\zaGQmji6Z63_ScA7zfwM8wyI.exe, PE32 14->106 dropped 108 C:\Users\...\pTkj77qXTdobuMywbz5MhlAt.exe, PE32 14->108 dropped 118 29 other files (27 malicious) 14->118 dropped 148 Drops PE files to the document folder of the user 14->148 150 Disable Windows Defender real time protection (registry) 14->150 110 C:\Users\user\AppData\...\Installations.exe, PE32 19->110 dropped 152 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 19->152 154 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 19->154 25 Installations.exe 19->25         started        28 chrome.exe 19->28         started        112 C:\Users\user\AppData\Local\Temp\CC4F.tmp, PE32 21->112 dropped 156 DLL reload attack detected 21->156 158 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 21->158 160 Renames NTDLL to bypass HIPS 21->160 162 Checks if the current machine is a virtual machine (disk enumeration) 21->162 30 explorer.exe 21->30 injected 138 101.36.107.74 UHGL-AS-APUCloudHKHoldingsGroupLimitedHK China 23->138 140 88.99.66.31 HETZNER-ASDE Germany 23->140 144 4 other IPs or domains 23->144 114 C:\Users\user\Documents\...\jg3_3uag.exe, PE32 23->114 dropped 116 C:\Users\user\AppData\Local\Temp\...\File.exe, PE32 23->116 dropped 164 Tries to harvest and steal browser information (history, passwords, etc) 23->164 166 Creates processes via WMI 23->166 32 File.exe 13 23->32         started        36 chrome.exe 20 23->36         started        38 Folder.exe 23->38         started        40 3 other processes 23->40 file7 signatures8 process9 dnsIp10 78 C:\Users\user\AppData\...\setup_installer.exe, PE32 25->78 dropped 42 setup_installer.exe 25->42         started        45 chrome.exe 28->45         started        120 92.53.96.150 TIMEWEB-ASRU Russian Federation 32->120 122 8.8.8.8 GOOGLEUS United States 32->122 168 Binary is likely a compiled AutoIt script file 32->168 124 142.250.184.206 GOOGLEUS United States 36->124 126 142.250.185.195 GOOGLEUS United States 36->126 130 8 other IPs or domains 36->130 80 C:\Users\user\AppData\Local\...\Cookies, SQLite 36->80 dropped 82 C:\Users\user\AppData\Local\Temp\axhub.dll, PE32 38->82 dropped 84 C:\...\api-ms-win-core-string-l1-1-0.dll, PE32 38->84 dropped 86 C:\...\api-ms-win-core-namedpipe-l1-1-0.dll, PE32 38->86 dropped 47 conhost.exe 38->47         started        128 20.189.173.20 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 40->128 file11 signatures12 process13 file14 88 C:\Users\user\AppData\...\setup_install.exe, PE32 42->88 dropped 90 C:\Users\user\AppData\...\libwinpthread-1.dll, PE32 42->90 dropped 92 C:\Users\user\AppData\...\libstdc++-6.dll, PE32 42->92 dropped 94 11 other files (none is malicious) 42->94 dropped 49 setup_install.exe 42->49         started        process15 dnsIp16 132 104.21.56.66 CLOUDFLARENETUS United States 49->132 70 C:\Users\user\AppData\...\jobiea_2.exe (copy), PE32 49->70 dropped 72 C:\Users\user\AppData\...\jobiea_1.exe (copy), PE32 49->72 dropped 74 C:\Users\user\AppData\...\jobiea_8.exe (copy), PE32 49->74 dropped 76 5 other files (none is malicious) 49->76 dropped 178 Detected unpacking (changes PE section rights) 49->178 54 cmd.exe 49->54         started        56 cmd.exe 49->56         started        58 cmd.exe 49->58         started        60 3 other processes 49->60 file17 signatures18 process19 process20 62 jobiea_1.exe 54->62         started        66 jobiea_2.exe 56->66         started        68 jobiea_3.exe 58->68         started        dnsIp21 146 74.114.154.22 AUTOMATTICUS Canada 62->146 180 Detected unpacking (changes PE section rights) 62->180 182 Detected unpacking (overwrites its own PE header) 62->182 184 Renames NTDLL to bypass HIPS 66->184 signatures22
Threat name:
Win32.Trojan.Glupteba
Status:
Malicious
First seen:
2021-07-12 01:58:00 UTC
AV detection:
18 of 27 (66.67%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:cryptbot family:glupteba family:metasploit family:raccoon family:redline family:smokeloader family:socelars family:vidar botnet:706 botnet:cana botnet:dibild botnet:domani2 botnet:fa93985ba268e1dd8b72ef392332edcba95ddd45 aspackv2 backdoor discovery dropper evasion infostealer loader spyware stealer suricata trojan upx vmprotect
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Kills process with taskkill
Modifies Internet Explorer settings
Modifies data under HKEY_USERS
Modifies registry class
Modifies system certificate store
NTFS ADS
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Windows directory
Suspicious use of SetThreadContext
autoit_exe
Checks installed software on the system
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
UPX packed file
VMProtect packed file
Vidar Stealer
CryptBot
CryptBot Payload
Glupteba
Glupteba Payload
MetaSploit
Modifies Windows Defender Real-time Protection settings
Process spawned unexpected child process
Raccoon
Raccoon Stealer Payload
RedLine
RedLine Payload
SmokeLoader
Socelars
Socelars Payload
Suspicious use of NtCreateProcessExOtherParentProcess
Suspicious use of NtCreateUserProcessOtherParentProcess
Vidar
suricata: ET MALWARE GCleaner Downloader Activity M1
suricata: ET MALWARE GCleaner Downloader Activity M2
suricata: ET MALWARE GCleaner Downloader Activity M3
suricata: ET MALWARE GCleaner Related Downloader User-Agent
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
Malware Config
C2 Extraction:
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
http://conceitosseg.com/upload/
http://integrasidata.com/upload/
http://ozentekstil.com/upload/
http://finbelportal.com/upload/
http://telanganadigital.com/upload/
haibam72.top
morelm07.top
135.148.139.222:33569
https://sergeevih43.tumblr.com/
176.111.174.254:56328
flestriche.xyz:80
Unpacked files
SH256 hash:
0c2ade2993927f6de828e30c07156c19751b55650a05c965631ca0ea1c983498
MD5 hash:
cc0d6b6813f92dbf5be3ecacf44d662a
SHA1 hash:
b968c57a14ddada4128356f6e39fb66c6d864d3f
SH256 hash:
55361941ab12c7edd987c706d25423d868f756fab1028d99eeffacdabf3da4ca
MD5 hash:
4de4b7bc0a92902422c4204fcfa58150
SHA1 hash:
587e0299ea32cc836281998941daa60f471e3480
SH256 hash:
40ca14be87ccee1c66cce8ce07d7ed9b94a0f7b46d84f9147c4bbf6ddab75a67
MD5 hash:
7165e9d7456520d1f1644aa26da7c423
SHA1 hash:
177f9116229a021e24f80c4059999c4c52f9e830
SH256 hash:
8d063d3aef4de69722e7dd08b9bda5fdf20da6d80a157d3f07fa0c3d5407e49d
MD5 hash:
559948db5816ae7ab26eb2eb533887ed
SHA1 hash:
e60442c6fb35239d298b01b0f4558264c01b2e7f
SH256 hash:
8206b4b3897ca45b9e083273f616902966e57091516844906e6ae2aefe63cef1
MD5 hash:
1c7be730bdc4833afb7117d48c3fd513
SHA1 hash:
dc7e38cfe2ae4a117922306aead5a7544af646b8
SH256 hash:
4d4ad145431ee356221914f2908ff9b4a4a56f90b9409ec752f7be1a978e7435
MD5 hash:
ae7c477ce9bd98d13ccff5fc4a0d190e
SHA1 hash:
249ff902f66c3d0cee6656802b14a9c34807bc8f
SH256 hash:
e1cc6a9d780602fe6e789bf5c3a27e87e197a4e3bf7c8138ea2f9dfec70fb963
MD5 hash:
f707252b9c9579677fffb013e0cfc646
SHA1 hash:
8ab483023fa8773afb8c13464c39c5b8e687f126
SH256 hash:
73bcd7a088690f86972bee32b3db2711efea80e5504b4afc537fc187e55bc1bb
MD5 hash:
fa772fb14e74692fce8095d61d5aa818
SHA1 hash:
87692c9742b892968c001e67c3df07f8c47dd248
SH256 hash:
d417bd4de6a5227f5ea5cff3567e74fe2b2a25c0a80123b7b37b27db89adc384
MD5 hash:
5668cb771643274ba2c375ec6403c266
SHA1 hash:
dd78b03428b99368906fe62fc46aaaf1db07a8b9
SH256 hash:
f3b6310267708b944d216b6076b68f97111b5230db97a37d84fe759c441295f6
MD5 hash:
69fc838583e8b440224db92056131e86
SHA1 hash:
a9939288bff48a284b8a6639a3cf99d3ffe65bf2
SH256 hash:
c638b1a56525b01c7a73366fc7c8d0c2b29353a31c4fcf3a7b7037e52caf4f28
MD5 hash:
0d8ebc2a16581f7b514a1699550ed552
SHA1 hash:
72f226e8efc041d998384a120f8e45d22c0f4218
SH256 hash:
8bd28ed722c7ce293f0a9ce3644e595965e448354ec231cfca25f887605c6f47
MD5 hash:
9065c4e9a648b1be7c03db9b25bfcf2a
SHA1 hash:
6ee58f69e199bbc1c7653a4e8621dd583ec6ac61
SH256 hash:
0db8aeda5003da3a7a88699ece04556f0f6b1d1400514d4cb374c88ddb8ec63d
MD5 hash:
dd5f6d433f6e89c232d56c88a61392bd
SHA1 hash:
2582fc1d123384bd7e2a07638bb37fcd3d79ca9a
SH256 hash:
f855237cba5b06f971f92764edb011d5949efed129d14056130069b1e12bd3db
MD5 hash:
4668a7d4b9f6b8f672fc9292dd4744c1
SHA1 hash:
0de41192524e78fd816256fd166845b7ca0b0a92
SH256 hash:
aa6cc42ad1c627460a4c54cfa46fa1934518c510d2bdb323ee119c460136ed3f
MD5 hash:
f2eb93b3bbe3cad8a4b76e74ffd3ccff
SHA1 hash:
e018afa2e24e5eb03598d37d9142674ad1d7ac2f
SH256 hash:
7296d60423fbfc4877e7bbb0c1352d0756908f9fbc53679bce463320e3a382f0
MD5 hash:
7ca1af0d05d832e6039ddb2629c6007f
SHA1 hash:
b3cf5b027fa6ee5a6cebb33bde0b36eb17e9956c
SH256 hash:
8c7cdb6916702d2387737927da9a3c49a6f4c1033545c1ed9bb37fc2829e4803
MD5 hash:
dca556c5c11a934a767c12ac44f179e5
SHA1 hash:
900f5ad3481cdb4f82dccf97d0b7ab272e599dce
SH256 hash:
d37e99805cee2a2a4d59542b88d1dfc23c7b166186666feef51f8751e940b174
MD5 hash:
7b61795697b50fb19d1f20bd8a234b67
SHA1 hash:
5134692d456da79579e9183c50db135485e95201
SH256 hash:
05a0e2bb4edb4424b571c0800ef5855650e4f2e0ea7c8849f902e4b72da8a6b0
MD5 hash:
9e8bdbe97867a95968062961861a20f9
SHA1 hash:
0f33e7137d8ee9adf16c51e1953dd800e1bc7eb1
SH256 hash:
9eddae4a2b0c361821d4f86bb8454784122d2f6ee6b4ba96eb905e126a6c2d7e
MD5 hash:
13d62ac9eb1e7198c2e3e1067f354cac
SHA1 hash:
81b2778d7d8cdb2ec5c164b0586d0eda706f4786
SH256 hash:
f520c0170705c35ad918c3250c5e2de3466688b89f8fdc246afb74f7a80a3ffe
MD5 hash:
b4c282d194c1e12648651fe0cdc4db93
SHA1 hash:
7df8f10936e203f67e9d1652ed55691ddc38bba2
SH256 hash:
d2b98afa799a8da5a5b9593050721fb2a337f51ca06b04849c6e27dca4bd14a1
MD5 hash:
397b062ed648483b75bf1daec30dd171
SHA1 hash:
393136e0bcbbf1b645b4ea0e2be4ff23c94bee3e
SH256 hash:
88d629dddea8dfdd05fc95df6127ea1f4dba39aaebda4c92b54d26e0524c8d06
MD5 hash:
a4c3b30c70ed966388d45e81f007c7da
SHA1 hash:
d42151845d43b672909dc7a6cedf9839985ccf5f
SH256 hash:
86ee9ec7ee23d4a88e77e89b499e6b200bb289c88e875941d921d67a16d5d8b3
MD5 hash:
1e7039fa2bd5338c49e6a2b55432399f
SHA1 hash:
a2700615593f7862337068a18d039e0e6b0659c1
SH256 hash:
b5e647c95d7b2533223766d83fb6986ddc60ae58a0b6a2bf55131990eefc71f4
MD5 hash:
b93754f3d3a83f9de44953d8da4ec98c
SHA1 hash:
952cb343109684d06dd01b1bd56145da6dc33878
Detections:
win_socelars_auto
SH256 hash:
525b87552bfa758040d9d92e8e96fc4f6e2470742780a19e0ff5fbb4d8a8ad64
MD5 hash:
3a75c7bd5e52585fd647ed3c3b215eb1
SHA1 hash:
602186d28dc7dc4574e2b44b5e19b0c4d8c0bdff
SH256 hash:
e6eeab73d3fd5fc127fe199d0b383ac8cb25df07b807ebfd64af403b8607545f
MD5 hash:
460e2ce65be24ac7cc2ab7961c498fdf
SHA1 hash:
62a95f45cdbb7657e4c2add2d97c5398856b0ff6
SH256 hash:
a4a1e79fcdffef6b387c3908a5f4dbfac19bafe68947b727d9d476815fb6256f
MD5 hash:
c05b231fc92a0ce444aea1ae639f11d8
SHA1 hash:
c92351bde1a127a09870f9d57b470f0d0d444493
SH256 hash:
a3955eb9b033e5f402e8024a3f89d00c658738864e37f42d4b159da575c09882
MD5 hash:
e417aa8541bcf628a6517ed829e92ebb
SHA1 hash:
3beaa2dd81804e10ab4a11343b698c4bca40584c
SH256 hash:
41e658615bd3601cecbd3b864ca8dbed9c0893574e700e893dacfb5d4df7ad30
MD5 hash:
39d083b42902b8964303c476419ac288
SHA1 hash:
061df5d1741d4f6625761ceafc091be13c0dddca
SH256 hash:
3d93d1e45579a47c3a3425fd16319c5a004396a2d98b7cf170ed009dad29c247
MD5 hash:
666b2557bae9f06363a55e64fe992f17
SHA1 hash:
affc2a67755549665a57d51c3c8767992ff20557
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:pe_imphash
Rule name:RedLine
Author:@bartblaze
Description:Identifies RedLine stealer.
Rule name:redline_new_bin
Author:James_inthe_box
Description:Redline stealer
Reference:https://app.any.run/tasks/4921d1fe-1a14-4bf2-9d27-c443353362a8
Rule name:redline_stealer
Author:jeFF0Falltrades
Description:This rule matches unpacked RedLine Stealer samples and derivatives (as of APR2021)
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:SUSP_XORed_MSDOS_Stub_Message
Author:Florian Roth
Description:Detects suspicious XORed MSDOS stub message
Reference:https://yara.readthedocs.io/en/latest/writingrules.html#xor-strings

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments