MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 41fd22c8947fb89a86a8d3f32b4ead30bb884bde8f00c66ed23ccef99b125585. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GCleaner


Vendor detections: 13


Intelligence 13 IOCs YARA 3 File information Comments

SHA256 hash: 41fd22c8947fb89a86a8d3f32b4ead30bb884bde8f00c66ed23ccef99b125585
SHA3-384 hash: 04a93e6f972b6299b384c951510dc9cf04c13701935798475011884fd5d71fc934ca93768ab3c3e950e090ef2a1367df
SHA1 hash: 0ab43dbd57e8975115a0a9259a193fc40fba9cdc
MD5 hash: 6f0ad74cbaf8702d5c2e784656abd306
humanhash: november-winner-maine-magnesium
File name:file
Download: download sample
Signature GCleaner
File size:2'210'261 bytes
First seen:2023-05-23 08:49:18 UTC
Last seen:2023-05-23 10:12:02 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash e92b45c54aa05ec107d5ef90662e6b33 (363 x GCleaner, 38 x Socks5Systemz, 3 x Backdoor.TeamViewer)
ssdeep 49152:5i4I6dwD+/FujODBNNOSsaRo5Nf2Tpc7bckPBs8wua:5i4JwD+dFDBzNRo3f4SpPOT
Threatray 3'773 similar samples on MalwareBazaar
TLSH T16BA533897FF24AF8E2B3CAB85E5B04B5993339774C25121DB29E0D4C476A752C90273B
TrID 82.8% (.EXE) Inno Setup installer (109740/4/30)
10.7% (.EXE) Win32 Executable Delphi generic (14182/79/4)
3.4% (.EXE) Win32 Executable (generic) (4505/5/1)
1.5% (.EXE) Generic Win/DOS Executable (2002/3)
1.5% (.EXE) DOS Executable Generic (2000/1)
File icon (PE):PE icon
dhash icon b298acbab2ca7a72 (2'327 x GCleaner, 1'631 x Socks5Systemz, 67 x RedLineStealer)
Reporter andretavare5
Tags:exe gcleaner


Avatar
andretavare5
Sample downloaded from http://45.12.253.74/pineapple.php?pub=mixinte

Intelligence


File Origin
# of uploads :
2
# of downloads :
279
Origin country :
US US
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
file
Verdict:
Malicious activity
Analysis date:
2023-05-23 08:49:52 UTC
Tags:
installer gcleaner

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a window
Creating a process from a recently created file
Сreating synchronization primitives
Searching for the window
Creating a file in the Program Files subdirectories
Moving a file to the Program Files subdirectory
Modifying a system file
Creating a file in the %AppData% subdirectories
Running batch commands
Creating a process with a hidden window
Using the Windows Management Instrumentation requests
Creating a file in the Windows subdirectories
Launching a process
Launching a tool to kill processes
Sending an HTTP GET request to an infection source
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckCmdLine
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware installer lolbin overlay packed shell32.dll
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Machine Learning detection for dropped file
Multi AV Scanner detection for dropped file
Snort IDS alert for network traffic
Yara detected Nymaim
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 873639 Sample: file.exe Startdate: 23/05/2023 Architecture: WINDOWS Score: 100 47 45.12.253.98 CMCSUS Germany 2->47 49 Snort IDS alert for network traffic 2->49 51 Found malware configuration 2->51 53 Antivirus detection for URL or domain 2->53 55 6 other signatures 2->55 10 file.exe 2 2->10         started        signatures3 process4 file5 31 C:\Users\user\AppData\Local\...\is-T457T.tmp, PE32 10->31 dropped 13 is-T457T.tmp 10 23 10->13         started        process6 file7 33 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 13->33 dropped 35 C:\Users\user\AppData\Local\...\_iscrypt.dll, PE32 13->35 dropped 37 C:\...\unins000.exe (copy), PE32 13->37 dropped 39 5 other files (4 malicious) 13->39 dropped 16 Rec523.exe 24 13->16         started        process8 dnsIp9 41 45.12.253.56, 49701, 80 CMCSUS Germany 16->41 43 45.12.253.72, 49702, 80 CMCSUS Germany 16->43 45 45.12.253.75, 49703, 80 CMCSUS Germany 16->45 29 C:\Users\user\AppData\...\vHgoAzKJu.exe, PE32 16->29 dropped 20 vHgoAzKJu.exe 16->20         started        23 cmd.exe 1 16->23         started        file10 process11 signatures12 57 Multi AV Scanner detection for dropped file 20->57 25 taskkill.exe 1 23->25         started        27 conhost.exe 23->27         started        process13
Threat name:
Win32.Trojan.Privateloader
Status:
Malicious
First seen:
2023-05-23 08:50:08 UTC
File Type:
PE (Exe)
Extracted files:
4
AV detection:
15 of 23 (65.22%)
Threat level:
  5/5
Result
Malware family:
gcleaner
Score:
  10/10
Tags:
family:gcleaner discovery loader
Behaviour
Kills process with taskkill
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Checks installed software on the system
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
GCleaner
Malware Config
C2 Extraction:
45.12.253.56
45.12.253.72
45.12.253.98
45.12.253.75
Unpacked files
SH256 hash:
93308f95be0517595235721ad70abacffa937da0da80c1a9a9511b44d7302339
MD5 hash:
6bf7bf18650b2e136b4742fb1fb1b783
SHA1 hash:
b0bb1a3a964db06b9eae8b82f3ac344d78063757
Detections:
Nymaim win_nymaim_g0 win_gcleaner_auto
Parent samples :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 hash:
3d9ad83deda28df25682b11b1b840b90cdf62f83981ea3acefb56b8586eee25a
MD5 hash:
471a16bfb2a656c7df578df90c6cf40a
SHA1 hash:
601ec859bd7c1d8d42debd36319aba355ec7b221
SH256 hash:
41fd22c8947fb89a86a8d3f32b4ead30bb884bde8f00c66ed23ccef99b125585
MD5 hash:
6f0ad74cbaf8702d5c2e784656abd306
SHA1 hash:
0ab43dbd57e8975115a0a9259a193fc40fba9cdc
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
Rule name:win_gcleaner_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.gcleaner.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Dropped by
PrivateLoader
  
Delivery method
Distributed via drive-by

Comments