MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 589f9841822ba66abe4cf94fc3f104307d13014de6d3ed4bc507873fe0653e2e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GCleaner


Vendor detections: 17


Intelligence 17 IOCs YARA File information Comments 1

SHA256 hash: 589f9841822ba66abe4cf94fc3f104307d13014de6d3ed4bc507873fe0653e2e
SHA3-384 hash: 2858df28dc952a30601b3882a38ac8ef16ea414bd03053b21ffb34ac446b35ba315880ad4f53f57ab7eefd85d3bf9fa9
SHA1 hash: e36627f6faaee192a2ab8f4d6e7ccad03409e306
MD5 hash: b59c8093621b9d5b5ad1905fab5aee00
humanhash: lithium-fanta-pluto-violet
File name:b59c8093621b9d5b5ad1905fab5aee00
Download: download sample
Signature GCleaner
File size:311'296 bytes
First seen:2023-07-08 06:10:17 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash a05021a5e6a8299dae264887f82f8054 (2 x Glupteba, 2 x Stealc, 1 x GCleaner)
ssdeep 6144:i083LPjsNIaUNNsEdX/k5+qgRxx4xwdmJLaTZoA:N837js+bjX4SD4i0KKA
Threatray 58 similar samples on MalwareBazaar
TLSH T12B64CF437594BC61E9655B32CE3EC2E8366EF511CE487B4632A87F6F29712B1E232341
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 33f0e8e8e8c0e969 (1 x GCleaner)
Reporter zbetcheckin
Tags:32 exe gcleaner

Intelligence


File Origin
# of uploads :
1
# of downloads :
318
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
28061b2c108210de2371acc68083ea74.exe
Verdict:
Malicious activity
Analysis date:
2023-07-08 04:50:39 UTC
Tags:
loader smoke trojan opendir amadey stealer vidar rat redline ransomware stop arkei miner

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Sending a custom TCP request
Running batch commands
Creating a process with a hidden window
Launching a tool to kill processes
Result
Malware family:
n/a
Score:
  9/10
Tags:
n/a
Behaviour
MalwareBazaar
SystemUptime
MeasuringTime
CPUID_Instruction
EvasionGetTickCount
EvasionQueryPerformanceCounter
CheckCmdLine
Verdict:
Malicious
Threat level:
  10/10
Confidence:
86%
Tags:
greyware packed xpack
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Ransomware.StopCrypt
Status:
Malicious
First seen:
2023-07-06 21:27:09 UTC
File Type:
PE (Exe)
Extracted files:
38
AV detection:
28 of 38 (73.68%)
Threat level:
  5/5
Result
Malware family:
gcleaner
Score:
  10/10
Tags:
family:gcleaner loader
Behaviour
Kills process with taskkill
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Checks computer location settings
Deletes itself
GCleaner
Malware Config
C2 Extraction:
45.12.253.56
45.12.253.72
45.12.253.98
45.12.253.75
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

GCleaner

Executable exe 589f9841822ba66abe4cf94fc3f104307d13014de6d3ed4bc507873fe0653e2e

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2023-07-08 06:10:18 UTC

url : hxxp://45.9.74.80/offer/setup.exe