MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 59d0992382ba2953514858b563ede4cbb4015af18494539bfb9be2d47a0c2270. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GCleaner


Vendor detections: 11


Intelligence 11 IOCs YARA 3 File information Comments

SHA256 hash: 59d0992382ba2953514858b563ede4cbb4015af18494539bfb9be2d47a0c2270
SHA3-384 hash: e2ce85de459d158b4b2fd06da42cc9da0ce8790502dd96d3885421d0c33780693e02cebc60e534cbb6c42c013f24c4c9
SHA1 hash: ec0cbbd1772173fc2ead1fe8e75b5bd20afc2a79
MD5 hash: 00539a669280db2e0ad9698545726156
humanhash: kilo-golf-single-king
File name:file
Download: download sample
Signature GCleaner
File size:2'182'069 bytes
First seen:2023-03-22 23:01:23 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 884310b1928934402ea6fec1dbd3cf5e (3'725 x GCleaner, 3'446 x Socks5Systemz, 262 x RaccoonStealer)
ssdeep 49152:EGlJfsEgZXIrjCQHNEefbwASqeg7MxVrUlVE1x6N/5dlLYp:5/gVUpfbwrqIxpN1EhPYp
Threatray 2'132 similar samples on MalwareBazaar
TLSH T1B4A5331A95A978B5F2F1F3F4A914C91BDF31B8631B352C18719D138F9EB6241C42E34A
TrID 50.3% (.EXE) Win32 Executable PowerBASIC/Win 9.x (148303/79/28)
37.2% (.EXE) Inno Setup installer (109740/4/30)
4.8% (.EXE) Win32 Executable Delphi generic (14182/79/4)
2.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
1.5% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon b298acbab2ca7a72 (2'327 x GCleaner, 1'631 x Socks5Systemz, 67 x RedLineStealer)
Reporter andretavare5
Tags:exe gcleaner


Avatar
andretavare5
Sample downloaded from http://45.12.253.74/pineapple.php?pub=mixinte

Intelligence


File Origin
# of uploads :
1
# of downloads :
255
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
file
Verdict:
Malicious activity
Analysis date:
2023-03-22 23:04:05 UTC
Tags:
installer loader gcleaner cryptbot

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %temp% subdirectories
Creating a window
Creating a process from a recently created file
Сreating synchronization primitives
Creating a file in the Program Files subdirectories
Moving a file to the Program Files subdirectory
Modifying a system file
Sending a custom TCP request
Creating a file in the %AppData% subdirectories
Sending an HTTP GET request
Running batch commands
Creating a process with a hidden window
Using the Windows Management Instrumentation requests
Creating a file in the Windows subdirectories
Launching a tool to kill processes
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware installer overlay packed shell32.dll
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
CryptbotV2, MinerDownloader, RedLine, Xm
Detection:
malicious
Classification:
troj.spyw.evad.mine
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Connects to a pastebin service (likely for C&C)
Contains functionality to inject code into remote processes
DNS related to crypt mining pools
Encrypted powershell cmdline option found
Found C&C like URL pattern
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
PE file has nameless sections
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Sigma detected: Schedule system process
Snort IDS alert for network traffic
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected CryptbotV2
Yara detected Generic MinerDownloader
Yara detected RedLine Stealer
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 832884 Sample: file.exe Startdate: 23/03/2023 Architecture: WINDOWS Score: 100 137 xmr-eu1.nanopool.org 2->137 139 pastebin.com 2->139 163 Snort IDS alert for network traffic 2->163 165 Malicious sample detected (through community Yara rule) 2->165 167 Antivirus detection for URL or domain 2->167 169 18 other signatures 2->169 15 file.exe 2 2->15         started        signatures3 process4 file5 135 C:\Users\user\AppData\Local\...\is-6506J.tmp, PE32 15->135 dropped 18 is-6506J.tmp 15 24 15->18         started        process6 file7 103 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 18->103 dropped 105 C:\Users\user\AppData\Local\...\_iscrypt.dll, PE32 18->105 dropped 107 C:\...\unins000.exe (copy), PE32 18->107 dropped 109 6 other files (4 malicious) 18->109 dropped 21 FRec322.exe 32 18->21         started        process8 dnsIp9 141 45.12.253.56, 49707, 80 CMCSUS Germany 21->141 143 45.12.253.72, 49708, 80 CMCSUS Germany 21->143 145 45.12.253.75, 49709, 49710, 80 CMCSUS Germany 21->145 111 C:\Users\user\AppData\...\iN1BT30IQ5kB.exe, PE32 21->111 dropped 113 C:\Users\user\AppData\Roaming\...\u51QHS.exe, PE32 21->113 dropped 115 C:\Users\user\AppData\...\rOFl4HGqn.exe, PE32 21->115 dropped 117 4 other malicious files 21->117 dropped 25 rOFl4HGqn.exe 4 21->25         started        28 u51QHS.exe 75 21->28         started        32 cmd.exe 21->32         started        34 2 other processes 21->34 file10 process11 dnsIp12 119 C:\Users\user\AppData\Roaming\...\m1.exe, PE32 25->119 dropped 121 C:\Users\user\AppData\Roaming\...\f1.exe, PE32 25->121 dropped 36 m1.exe 25->36         started        39 f1.exe 25->39         started        41 cmd.exe 25->41         started        157 nekbpu32.top 85.31.45.219, 49711, 80 CLOUDCOMPUTINGDE Germany 28->157 159 tigkot04.top 185.246.220.246, 49712, 80 LVLT-10753US Germany 28->159 123 C:\Users\user\AppData\Roaming\...\quetch.exe, PE32 28->123 dropped 201 Multi AV Scanner detection for dropped file 28->201 203 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 28->203 205 Tries to detect virtualization through RDTSC time measurements 28->205 43 cmd.exe 28->43         started        45 cmd.exe 28->45         started        207 Encrypted powershell cmdline option found 32->207 209 Uses schtasks.exe or at.exe to add and modify task schedules 32->209 47 conhost.exe 32->47         started        49 taskkill.exe 32->49         started        file13 signatures14 process15 signatures16 183 Writes to foreign memory regions 36->183 185 Allocates memory in foreign processes 36->185 187 Injects a PE file into a foreign processes 36->187 51 RegSvcs.exe 36->51         started        54 WerFault.exe 36->54         started        189 Contains functionality to inject code into remote processes 39->189 56 RegSvcs.exe 39->56         started        59 WerFault.exe 39->59         started        70 2 other processes 41->70 61 quetch.exe 43->61         started        64 conhost.exe 43->64         started        66 conhost.exe 45->66         started        68 timeout.exe 45->68         started        process17 dnsIp18 171 Writes to foreign memory regions 51->171 173 Injects a PE file into a foreign processes 51->173 72 AppLaunch.exe 51->72         started        77 conhost.exe 51->77         started        147 91.193.43.63 ITFPL Belgium 56->147 149 api.ip.sb 56->149 133 C:\Users\user\AppData\...\DpEditor.exe, PE32 61->133 dropped 175 Multi AV Scanner detection for dropped file 61->175 177 Query firmware table information (likely to detect VMs) 61->177 179 Hides threads from debuggers 61->179 181 Tries to detect sandboxes / dynamic malware analysis system (registry check) 61->181 79 DpEditor.exe 61->79         started        file19 signatures20 process21 dnsIp22 151 github.com 140.82.121.3 GITHUBUS United States 72->151 153 raw.githubusercontent.com 185.199.108.133 FASTLYUS Netherlands 72->153 155 2 other IPs or domains 72->155 125 C:\ProgramData\Dllhost\winlogson.exe, PE32+ 72->125 dropped 127 C:\ProgramData\Dllhost\dllhost.exe, PE32 72->127 dropped 129 C:\ProgramData\Dllhost\WinRing0x64.sys, PE32+ 72->129 dropped 131 C:\ProgramData\HostData\logs.uce, ASCII 72->131 dropped 193 Sample is not signed and drops a device driver 72->193 81 cmd.exe 72->81         started        84 cmd.exe 72->84         started        86 cmd.exe 72->86         started        195 Query firmware table information (likely to detect VMs) 79->195 197 Hides threads from debuggers 79->197 199 Tries to detect sandboxes / dynamic malware analysis system (registry check) 79->199 file23 signatures24 process25 signatures26 161 Encrypted powershell cmdline option found 81->161 88 powershell.exe 81->88         started        91 conhost.exe 81->91         started        93 conhost.exe 84->93         started        95 schtasks.exe 84->95         started        97 conhost.exe 86->97         started        99 schtasks.exe 86->99         started        process27 signatures28 191 Query firmware table information (likely to detect VMs) 88->191 101 wermgr.exe 88->101         started        process29
Threat name:
Win32.Trojan.Privateloader
Status:
Suspicious
First seen:
2023-03-22 23:02:11 UTC
File Type:
PE (Exe)
Extracted files:
4
AV detection:
14 of 24 (58.33%)
Threat level:
  5/5
Result
Malware family:
gcleaner
Score:
  10/10
Tags:
family:gcleaner discovery loader
Behaviour
Kills process with taskkill
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Checks installed software on the system
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
GCleaner
Malware Config
C2 Extraction:
45.12.253.56
45.12.253.72
45.12.253.98
45.12.253.75
Unpacked files
SH256 hash:
a8caae24784c8001b7f58df1488ae658c6e0cd8ad66398059a3bdbe2eff81872
MD5 hash:
a5617bb09ff4c9ef84c85e9622d71d83
SHA1 hash:
7a2cfe366a708886244c2cebee74d2d416551600
Detections:
Nymaim win_nymaim_g0 win_gcleaner_auto
SH256 hash:
09f7a98f9faff9cfa9660e4313240a042b3ea926c2b22e9a5917a51954bdb406
MD5 hash:
ccde6434219bba990f613c8d12008b76
SHA1 hash:
79c910aad3ef2b6acc4e119aa0cbd141dd6c6871
SH256 hash:
59d0992382ba2953514858b563ede4cbb4015af18494539bfb9be2d47a0c2270
MD5 hash:
00539a669280db2e0ad9698545726156
SHA1 hash:
ec0cbbd1772173fc2ead1fe8e75b5bd20afc2a79
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
Rule name:win_gcleaner_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.gcleaner.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Dropped by
PrivateLoader
  
Delivery method
Distributed via drive-by

Comments