MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 4476205581e2458189aa15418b5bb37f8b47590c6e85ce2904baa689481d27fd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
GCleaner
Vendor detections: 13
| SHA256 hash: | 4476205581e2458189aa15418b5bb37f8b47590c6e85ce2904baa689481d27fd |
|---|---|
| SHA3-384 hash: | 9839d33103b0baacc60e1fe4a92e94c02d481662284bc918630052bcd66e18f8b7a46c6bcde9a5df6831c62b15a41a89 |
| SHA1 hash: | 5b06adda4f07f7136c248bfb2d365e39621c0497 |
| MD5 hash: | d5fc6f81531cb18c1b7c9f74c23d46ce |
| humanhash: | timing-johnny-muppet-california |
| File name: | SecuriteInfo.com.Trojan.Inject5.57588.24834.17062 |
| Download: | download sample |
| Signature | GCleaner |
| File size: | 3'497'760 bytes |
| First seen: | 2025-06-22 05:28:53 UTC |
| Last seen: | 2025-06-22 06:21:59 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 8d9b89a9ca98e0f47fd4f2589e97a409 (24 x GCleaner) |
| ssdeep | 49152:svI8gzxvKaAWHHvXYqMwyb2n7H3Wnk+YWr8ZJE+iLPuikflZxFC52GtsZ9:CI8g0kHPbUaJs3uplZxFC52GtK9 |
| TLSH | T186F5F075A0E32D31FB52227FAC5777968967A8423FA42101BFCB0D867E578882671C63 |
| TrID | 52.9% (.EXE) Win32 Executable Delphi generic (14182/79/4) 16.8% (.EXE) Win32 Executable (generic) (4504/4/1) 7.7% (.EXE) Win16/32 Executable Delphi generic (2072/23) 7.5% (.EXE) OS/2 Executable (generic) (2029/13) 7.4% (.EXE) Generic Win/DOS Executable (2002/3) |
| Magika | pebin |
| Reporter | |
| Tags: | exe gcleaner |
Intelligence
File Origin
FRVendor Threat Intelligence
Result
Behaviour
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files
eeede388173961d4f7b03bc631b2040a4278f7d70acd237d89260c8c6d2ed496
fb5ac49f66f0b72d2e1ff98464f165b9aa813d361ca41381daf6803b927686cc
269d27fe9542455527b4c44460c2a9c291d233c5ec1bd82206a77f1d228bcabf
82443e8766eac4fbeaeca49858b650388e1e1cee50d545b011d5b8680b106c33
b0c8744cf8cf70c74dd1c1355e8f1572b13ef1436dd7184598a8dbd7a1d73280
9ce79be1defd51aa1bbef02ae80c4dd9b98b7c0f19b39ece7046e0313e4e8ded
fa6fbb09b7f94b2997010349058b485e0ea85dd4c6e28a9c7ae8cac3276e96d2
46b609704e4ab445dfc071eb1886a12b4e93d34186974e6c843181d5a13d6cfe
75ff97c1eb9590f55973383a2fa89dad82b7631e22e26e273c9de14a25902cff
36d56ccf95149e28ddfc3e87c1254c944d15180ef777e59aa9fc7ea0ae1d42be
b265437d22a93d8f3476e02190ed2bf6faec8d8b92d5b58cb7473feb9e1ac61d
6a7492e8424df1f60d49da157b7a5f32beb5ed38bd83d741e3b313480586eec1
15a515744c599357ed3c534890753eb7d62930774d962c7936fc29ae5fa360b1
d665b13144fd52ae223b6556aa6c9f8c85557da9527fd4cb44f736ba72f0e75c
78eaaf970343b836d80dc13864c645b2b8a4ab6ea0ffab2294d5c0b7b085cc56
baa0dd2902580029c9eeadb90eb209e9c3526615f3002159c528d48c0c0414fa
287e9d5dac3e8ab1f6a32cf093287ed74b4b82d89eb26b6d50c9bae4ae5b4cdb
934ba9a72dc00ae1271d8b2c4008f2392e2d41af560742e879ad897a52d3c359
c0c75ab266f5f078c6c2505b3ede47f73ebdc86d53454d54d0be627d3d8c38b4
4538f4d180eb3b1f1ce827ad5225715dd60ba84099cc57772d6b4a7a55a1e2b3
2342a9c39a6c81978ebd75a7795695efc45573010c10d59f0ade2e42cabdab21
4476205581e2458189aa15418b5bb37f8b47590c6e85ce2904baa689481d27fd
c2fbc135e0d3cea7f585a8033d1d1ebbed1dcd674dfadedddfe2c6dc477a8a1a
10152147ac921560f8831fd504039efd7bb480392c57d8bfe240111d05fac5d0
eeea1b83653aa17806a1600206275e7868f8a519383e37040c4e5f890daa07be
efc00dd0896804d8bab9f90b3067e07b14fbbefc170eb3952d5976972eceb6c4
0e400163a03dafcdd1fb201f1d14c3a44fee91f057d8f5801d1dbbc4db6b5a7d
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | BobSoftMiniDelphiBoBBobSoft |
|---|---|
| Author: | malware-lu |
| Rule name: | Borland |
|---|---|
| Author: | malware-lu |
| Rule name: | nuso |
|---|---|
| Author: | Michelle Khalil |
| Description: | This rule detects unpacked nuso malware samples. |
| Rule name: | pe_detect_tls_callbacks |
|---|
| Rule name: | PE_Digital_Certificate |
|---|---|
| Author: | albertzsigovits |
| Rule name: | shellcode |
|---|---|
| Author: | nex |
| Description: | Matched shellcode byte patterns |
| Rule name: | Sus_Obf_Enc_Spoof_Hide_PE |
|---|---|
| Author: | XiAnzheng |
| Description: | Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP) |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.