MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 47e9b75457446a3b3c86622dd282065b0f88603e2c009670c1f7eaf00183a407. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GCleaner


Vendor detections: 13


Intelligence 13 IOCs 2 YARA 8 File information Comments

SHA256 hash: 47e9b75457446a3b3c86622dd282065b0f88603e2c009670c1f7eaf00183a407
SHA3-384 hash: d8ba6d9fb6d5f496c08554523a3bdf24364a39a8507e443e56e03380b20dd19002261ad4e128c8c1d61eecd679719f78
SHA1 hash: 946b8ef33d2edcfe03444356023611f7c2681b5f
MD5 hash: 6a5e17cb8195f94a52d571567ec64f2c
humanhash: avocado-wisconsin-beer-august
File name:47E9B75457446A3B3C86622DD282065B0F88603E2C009.exe
Download: download sample
Signature GCleaner
File size:3'024'056 bytes
First seen:2022-01-22 22:20:59 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 32569d67dc210c5cb9a759b08da2bdb3 (122 x RedLineStealer, 42 x DiamondFox, 37 x RaccoonStealer)
ssdeep 49152:xcB2EwJ84vLRaBtIl9mVLzfBOqsAOV6Y7D4V5CkIdVIp2UboTfMmpdNCvjlmrl/h:xYCvLUBsgHfBxkH45Id22UbAfjjim5/h
TLSH T1B4E53320BA86C9F6E64255309A46BF7550FDC38407360CC7B3A5D60E2E38FDDC63AA56
File icon (PE):PE icon
dhash icon 848c5454baf47474 (2'088 x Adware.Neoreklami, 101 x RedLineStealer, 33 x DiamondFox)
Reporter abuse_ch
Tags:exe gcleaner


Avatar
abuse_ch
GCleaner C2:
148.251.189.166:11784

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
148.251.189.166:11784 https://threatfox.abuse.ch/ioc/313092/
91.243.59.147:33459 https://threatfox.abuse.ch/ioc/313093/

Intelligence


File Origin
# of uploads :
1
# of downloads :
370
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
47E9B75457446A3B3C86622DD282065B0F88603E2C009.exe
Verdict:
No threats detected
Analysis date:
2022-01-22 22:28:15 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching the default Windows debugger (dwwin.exe)
Creating a process with a hidden window
Creating a window
DNS request
Sending an HTTP GET request
Reading critical registry keys
Searching for the window
Creating a file in the %temp% subdirectories
Сreating synchronization primitives
Creating a process from a recently created file
Running batch commands
Sending a custom TCP request
Searching for synchronization primitives
Launching a process
Query of malicious DNS domain
Unauthorized injection to a recently created process
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckCmdLine
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
barys overlay packed shell32.dll virus
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
SmokeLoader Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to steal Chrome passwords or cookies
Creates a thread in another existing process (thread injection)
Detected unpacking (changes PE section rights)
Disable Windows Defender real time protection (registry)
Downloads files with wrong headers with respect to MIME Content-Type
Found C&C like URL pattern
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Maps a DLL or memory area into another process
May check the online IP address of the machine
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Performs DNS queries to domains with low reputation
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Script Execution From Temp Folder
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to resolve many domain names, but no domain seems valid
Yara detected SmokeLoader
Yara detected Vidar stealer
Yara Genericmalware
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 558209 Sample: 47E9B75457446A3B3C86622DD28... Startdate: 22/01/2022 Architecture: WINDOWS Score: 100 82 staticimg.youtuuee.com 2->82 84 eduarroma.tumblr.com 2->84 86 2 other IPs or domains 2->86 118 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->118 120 Multi AV Scanner detection for domain / URL 2->120 122 Antivirus detection for URL or domain 2->122 126 16 other signatures 2->126 10 47E9B75457446A3B3C86622DD282065B0F88603E2C009.exe 16 2->10         started        signatures3 124 Tries to resolve many domain names, but no domain seems valid 82->124 process4 file5 58 C:\Users\user\AppData\...\setup_install.exe, PE32 10->58 dropped 60 C:\Users\user\AppData\...\Mon10ee26b81113.exe, PE32 10->60 dropped 62 C:\Users\user\AppData\...\Mon10bee586c43.exe, PE32 10->62 dropped 64 11 other files (6 malicious) 10->64 dropped 13 setup_install.exe 1 10->13         started        process6 dnsIp7 100 127.0.0.1 unknown unknown 13->100 102 hsiens.xyz 13->102 164 Performs DNS queries to domains with low reputation 13->164 166 Adds a directory exclusion to Windows Defender 13->166 17 cmd.exe 1 13->17         started        19 cmd.exe 13->19         started        21 cmd.exe 1 13->21         started        23 8 other processes 13->23 signatures8 process9 signatures10 26 Mon102f195c842d.exe 17->26         started        29 Mon101642879b4b.exe 19->29         started        33 Mon1056e7bd672a20eeb.exe 21->33         started        128 Adds a directory exclusion to Windows Defender 23->128 35 Mon1059707862f63.exe 23->35         started        37 Mon10a01a521ba6796c.exe 23->37         started        39 Mon10ee26b81113.exe 23->39         started        41 3 other processes 23->41 process11 dnsIp12 130 Antivirus detection for dropped file 26->130 132 Multi AV Scanner detection for dropped file 26->132 134 Detected unpacking (changes PE section rights) 26->134 154 4 other signatures 26->154 43 explorer.exe 26->43 injected 112 9 other IPs or domains 29->112 76 C:\Users\user\...76iceProcessX64[1].bmp, PE32+ 29->76 dropped 78 C:\Users\...\COVPjWQAJuNbxh0ARrSKSLKX.exe, PE32+ 29->78 dropped 136 May check the online IP address of the machine 29->136 138 Tries to harvest and steal browser information (history, passwords, etc) 29->138 140 Disable Windows Defender real time protection (registry) 29->140 48 COVPjWQAJuNbxh0ARrSKSLKX.exe 29->48         started        104 staticimg.youtuuee.com 33->104 106 ip-api.com 208.95.112.1, 49753, 80 TUT-ASUS United States 33->106 108 a.goatgame.co 33->108 142 Contains functionality to steal Chrome passwords or cookies 33->142 114 5 other IPs or domains 35->114 144 Performs DNS queries to domains with low reputation 35->144 146 Machine Learning detection for dropped file 35->146 50 WerFault.exe 37->50         started        52 WerFault.exe 37->52         started        54 WerFault.exe 37->54         started        80 C:\Users\user\AppData\...\Mon10ee26b81113.tmp, PE32 39->80 dropped 148 Obfuscated command line found 39->148 56 Mon10ee26b81113.tmp 39->56         started        110 a.goatgame.co 41->110 116 5 other IPs or domains 41->116 file13 150 System process connects to network (likely due to code injection or exploit) 110->150 152 Tries to resolve many domain names, but no domain seems valid 110->152 signatures14 process15 dnsIp16 88 people4jan.com 43->88 90 nextlytm.com 43->90 98 3 other IPs or domains 43->98 66 C:\Users\user\AppData\Roaming\gtswece, PE32 43->66 dropped 156 System process connects to network (likely due to code injection or exploit) 43->156 158 Benign windows process drops PE files 43->158 160 Hides that the sample has been downloaded from the Internet (zone.identifier) 43->160 68 C:\Users\...\pidHTSIGEi8DrAmaYu9K8ghN89.dll, PE32+ 48->68 dropped 92 the-flash-man.com 56->92 94 best-link-app.com 56->94 96 a.goatgame.co 56->96 70 C:\Users\user\AppData\Local\Temp\...\idp.dll, PE32 56->70 dropped 72 C:\Users\user\AppData\Local\...\_shfoldr.dll, PE32 56->72 dropped 74 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 56->74 dropped file17 162 Tries to resolve many domain names, but no domain seems valid 90->162 signatures18
Threat name:
Win32.Downloader.SmallAgent
Status:
Malicious
First seen:
2021-08-30 18:40:00 UTC
File Type:
PE (Exe)
Extracted files:
185
AV detection:
21 of 27 (77.78%)
Threat level:
  3/5
Verdict:
malicious
Label(s):
Result
Malware family:
Score:
  10/10
Tags:
family:raccoon family:vidar botnet:1bc6116182dfd33bce1052fe9bb0415968161030 botnet:26ba8731a23ebe331ca665e334da5a21506c1e2d aspackv2 evasion spyware stealer suricata trojan
Behaviour
Checks SCSI registry key(s)
Creates scheduled task(s)
Modifies system certificate store
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
NSIS installer
Enumerates physical storage devices
Program crash
Suspicious use of NtSetInformationThreadHideFromDebugger
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks BIOS information in registry
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Modifies Windows Defender Real-time Protection settings
Raccoon
Suspicious use of NtCreateProcessExOtherParentProcess
Vidar
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2
Unpacked files
SH256 hash:
e427f8ef21691e3d8c2313d11129ad08ddef69a158eca2f77c170603478ff0c4
MD5 hash:
0dedd909aae9aa0a89b4422106310e9e
SHA1 hash:
271d36afa5b729ee590cf8066166ca5e9c9d0340
SH256 hash:
5050bc56c683a4dbfda08b43d68973961458fd712164c3792d060153c2bd7027
MD5 hash:
f9210936145be5d696c5c80f8f464a58
SHA1 hash:
4647f8be74272b9a6d6d039fc6bb68aca0c8b49c
SH256 hash:
a18e5d223da775448e2e111101fe1f4ab919be801fd435d3a278718aa5e6ccba
MD5 hash:
0c6cae115465a83f05d3ff391fd009ac
SHA1 hash:
066ea93bb540ae4be0d2e522d4bb59eec74053ad
Detections:
win_vidar_auto
SH256 hash:
835c9b5e60ebf50a888e851d1c7218d436490613ec04a04055b73fbddf73edf3
MD5 hash:
6961557695f34a53cf8224be7c265fbe
SHA1 hash:
f52d34d0b1dbd181f2acb21f42d875d514afb6f7
SH256 hash:
7bea558a7faa41d50ea0bd08ab2a6b71281d53ef54ecde6fe351c9c7a6360bd6
MD5 hash:
4a983111bf682d20f1506960bfefc933
SHA1 hash:
c8df801f2ac422c898f504e35068ebb46602d475
SH256 hash:
0ad66694cd51054a517518f066a3aadcbc97c11f81f77139e7accc31e44482b0
MD5 hash:
963d59faade426d73cebf79abbf0685b
SHA1 hash:
a036fc0cf108522c792328a17a5b51a88a726978
SH256 hash:
9ead82463c776e2ffcd760df60714759a21a67f6b6fadb6188d0343ed8c7388b
MD5 hash:
d41d12517d9fecd975fafd669c126595
SHA1 hash:
86df1e1f2e07bcc928440455f8cfd5b8d6c8e54a
SH256 hash:
fbffb84931a267fab6c24cf08723fa029cb85c2315f01d5b1f41922350adb831
MD5 hash:
052270e8e9cfb3512932e0df484caef4
SHA1 hash:
85305fee690beea8458bab5d55d0368c47340501
SH256 hash:
81bfcd349312d6a769a47be66f47c23b1bac991645ccb611720b43d878521745
MD5 hash:
9c46fb55fe6c39dd9f04d2facdcf791b
SHA1 hash:
5ebefd202caf78eebd75b71e551e8a265d05b57a
SH256 hash:
813cc1f3798fcb5be3560323856d74370f6d383bb55463b4af55590c965b340d
MD5 hash:
9511e9c3e35be3058f3736d006593bb9
SHA1 hash:
54c8ae96f2a95840422b4f3bb48744fdd2764c3c
SH256 hash:
9f49d2110ce857ad6bc5a59870ee37d02651dd381820320827a7477082836f3e
MD5 hash:
aba80c623dd45ad9f26e1474cece96af
SHA1 hash:
462562d51999490104300abd8999d25c03f359c7
SH256 hash:
8d571db5a5a0c2bdffea9709bc35bf6051449bdf96c481280e9e8a0838985478
MD5 hash:
0d6daba8663f3df2bd99601400a0725b
SHA1 hash:
0ed9a3d38605f8008217e11843b2341093b3cd6d
SH256 hash:
8ef1b539c625530964be2400fb46f26c40ff18b63d4df853a3c5c01d51a4fb17
MD5 hash:
86084f1161708990d1bc171fb0eddf5f
SHA1 hash:
ab360edeb4e7a6d20f5643da74251021e0ffc773
SH256 hash:
5aa96a995c6b36516a15ac938fb266b7f98b99db6b7c75960042a5678749319b
MD5 hash:
51a20e718a4d62c1b82f1064f13f20f8
SHA1 hash:
144dc6f8f9545ca771b9b53a6fea4153bf15503d
SH256 hash:
b797425295fb8329084edf74e01bf4113cf965f214495853fc601de001701af7
MD5 hash:
a047e58f5a9e2bcf8261f68152abb2b4
SHA1 hash:
8f9cd46287777e055baf10cf8d9089160ccfb547
SH256 hash:
0e9f52753e54b9e3287f391882af32c10df354154cdf0e1cf46fa0214235f591
MD5 hash:
4c10fb915fa8292be4ffd0f9dba499cb
SHA1 hash:
d3f8785e74f3a5bbbc9c65f92f3944ca6594116a
SH256 hash:
47e9b75457446a3b3c86622dd282065b0f88603e2c009670c1f7eaf00183a407
MD5 hash:
6a5e17cb8195f94a52d571567ec64f2c
SHA1 hash:
946b8ef33d2edcfe03444356023611f7c2681b5f
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_ASPack
Author:ditekSHen
Description:Detects executables packed with ASPack
Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation
Author:ditekSHen
Description:Detects executables containing potential Windows Defender anti-emulation checks
Rule name:MALWARE_Win_DLInjector03
Author:ditekSHen
Description:Detects unknown loader / injector
Rule name:MALWARE_Win_DLInjector06
Author:ditekSHen
Description:Detects downloader / injector
Rule name:MALWARE_Win_Vidar
Author:ditekSHen
Description:Detects Vidar / ArkeiStealer
Rule name:RedOctoberPluginCollectInfo
Rule name:Vidar
Author:kevoreilly
Description:Vidar Payload

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments