MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 5cccd82fbb3928236bb753a0c198f19d4338f0af1b4b8618a21fa5899fe5ac41. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
GCleaner
Vendor detections: 11
| SHA256 hash: | 5cccd82fbb3928236bb753a0c198f19d4338f0af1b4b8618a21fa5899fe5ac41 |
|---|---|
| SHA3-384 hash: | 3648067b0d527bf07f8c4642bf084b6646ad2978420fa8baffdce97a1c6cc7ef8c02fc99e34c9c262d498688982e29d9 |
| SHA1 hash: | c9e794b6ab39d7b182372e88124d3bada8031574 |
| MD5 hash: | a02d9e097100e1e197344038e214817c |
| humanhash: | video-bravo-vegan-apart |
| File name: | a02d9e097100e1e197344038e214817c.exe |
| Download: | download sample |
| Signature | GCleaner |
| File size: | 6'034'969 bytes |
| First seen: | 2021-11-08 06:50:31 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 101 x GuLoader, 64 x DiamondFox) |
| ssdeep | 98304:Jrwz2BLnbgEHlym3/g9IE4nycWh28CWQJABHkd0R5MFox7wobkGSA7IV+Hip:Jr22BDd0P4yXh2+BTMI7bDSNqip |
| Threatray | 682 similar samples on MalwareBazaar |
| TLSH | T13056333CA7454270F43A2378B820568F9C5E9EDB1C9F8337D12A169D1AD2FF249BE215 |
| File icon (PE): | |
| dhash icon | b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla) |
| Reporter | |
| Tags: | exe gcleaner |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| 185.215.113.29:1102 | https://threatfox.abuse.ch/ioc/244872/ |
Intelligence
File Origin
# of uploads :
1
# of downloads :
123
Origin country :
n/a
Vendor Threat Intelligence
Detection:
n/a
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Tags:
mokes overlay packed trickbot
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
FormBook Raccoon RedLine Socelars Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (creates a PE file in dynamic memory)
Disable Windows Defender real time protection (registry)
Disables Windows Defender (via service or powershell)
Hijacks the control flow in another process
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Sample uses process hollowing technique
Sets debug register (to hijack the execution of another thread)
Sigma detected: MSHTA Spawning Windows Shell
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious MSHTA Process Patterns
Sigma detected: Suspicious Script Execution From Temp Folder
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Writes to foreign memory regions
Yara detected FormBook
Yara detected Raccoon Stealer
Yara detected RedLine Stealer
Yara detected Socelars
Yara detected Vidar stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Backdoor.Zapchast
Status:
Malicious
First seen:
2021-11-06 18:35:00 UTC
AV detection:
21 of 28 (75.00%)
Threat level:
5/5
Detection(s):
Malicious file
Verdict:
malicious
Similar samples:
+ 672 additional samples on MalwareBazaar
Result
Malware family:
vidar
Score:
10/10
Tags:
family:redline family:smokeloader family:socelars family:vidar botnet:916 botnet:media0421 botnet:user112 aspackv2 backdoor evasion infostealer stealer suricata trojan
Behaviour
Creates scheduled task(s)
Delays execution with timeout.exe
Kills process with taskkill
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Looks up geolocation information via web service
Loads dropped DLL
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
Modifies Windows Firewall
Vidar Stealer
Process spawned unexpected child process
RedLine
RedLine Payload
SmokeLoader
Socelars
Socelars Payload
Vidar
suricata: ET MALWARE GCleaner Downloader Activity M5
suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01
suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin
Malware Config
C2 Extraction:
http://www.hhgenice.top/
https://mas.to/@kirpich
http://misha.at/upload/
http://roohaniinfra.com/upload/
http://0axqpcc.cn/upload/
http://mayak-lombard.ru/upload/
http://mebel-lass.ru/upload/
http://dishakhan.com/upload/
135.181.129.119:4805
91.121.67.60:23325
https://mas.to/@kirpich
http://misha.at/upload/
http://roohaniinfra.com/upload/
http://0axqpcc.cn/upload/
http://mayak-lombard.ru/upload/
http://mebel-lass.ru/upload/
http://dishakhan.com/upload/
135.181.129.119:4805
91.121.67.60:23325
Unpacked files
SH256 hash:
b9b1cc9ba58accdfe8c5d7bb874ea90819320fd4178e7deabd81d1fdb834beda
MD5 hash:
e0b528cce64f43b141b1a36a6e7a4d3b
SHA1 hash:
f3823c1706c0eb25b30a28d066ce2defdecde3d9
SH256 hash:
bee014fe2735fb9edb3c0b1170e878c93f85da4a09b1726ae7f863440357202b
MD5 hash:
c3af85aec0d2a90819f7193b56bfe180
SHA1 hash:
9bd7ac2f68278319cd640b53fe1c336171c445c0
SH256 hash:
faac5856fbfcb5f9e89568a3256de5e11aa5851802d0a902ac62d3624759a153
MD5 hash:
29051443bbd2bf2ee8f0722a1f56c99a
SHA1 hash:
9c9d93c4b393b466642f90cbb8e2338219b59b79
SH256 hash:
012e9fa8ebaaa475cf8004463a660073e0e139a3dd5acfe138e76b03a80f68cf
MD5 hash:
a0d4817976bf8dc7ac52a3101d846fa8
SHA1 hash:
3669d388445bcbba8bc7c825c0648be089550caa
SH256 hash:
88b2d8a7fbf025987947226c9d6d72c72f93bdc182d05857893027289059ef09
MD5 hash:
3addf1aab7f2237dd61b6857f2832c9c
SHA1 hash:
2e9f422f0717ca2e8fd9d0b4fff720dcd367e2c4
SH256 hash:
e427f8ef21691e3d8c2313d11129ad08ddef69a158eca2f77c170603478ff0c4
MD5 hash:
0dedd909aae9aa0a89b4422106310e9e
SHA1 hash:
271d36afa5b729ee590cf8066166ca5e9c9d0340
SH256 hash:
0e3a4882244c530eb460966acfbf76e97b8402c1fa27ea7b74ac651e078164ab
MD5 hash:
2545294d86199f2500301b776dcedafb
SHA1 hash:
b8f38b89ead4e0aecca0efde83fd5fd40fff2e97
SH256 hash:
38225dc5826f194a09c48d08abbd176e806a8e13c1f2f9758631f5e51988a83e
MD5 hash:
3ba48d0fed22173a120483e738b1bae3
SHA1 hash:
8e937f85dc04864a868e52a4a0047e6f552ec168
SH256 hash:
7ac4cc59bb66c43d7680ba930bf5c2c98f7ca08c591b9bf6556699f7a4fa2260
MD5 hash:
6617d0e761abcea3a66eb53243e85f34
SHA1 hash:
7e2ef58648d5e34bae9089e073e7fc5c87846bde
SH256 hash:
c0219617eebc0f5682fbdc289821f73919d1c3980d9e5e4ca0c22b570087d790
MD5 hash:
d2d2c54cf3c3c3ad390fbb31d47b0be0
SHA1 hash:
6d16e1edd8cb3a90086b3987938d833b7b282689
SH256 hash:
d8ebb4faf28b7edc6509a9e2ee2b317b3a242ad06d05e126a8d8a2437da493fe
MD5 hash:
c90a821c8f9bfaf11a13e2423b41a4a7
SHA1 hash:
3fb3760bdec7a04fbb6f8829c8eb5f9daa2874c6
SH256 hash:
5d698eca36f2f1559952e48e87d820847e6be9b8f8a5214913ae944fffde78b4
MD5 hash:
83a8ee136bf8cc2bb713f881ce088c49
SHA1 hash:
24b2148d19db34e8e6c529095029352494416ee9
SH256 hash:
712ede35e5f34fc2d9000951e336771577915cab75c3c1bb72a6aea96e16b265
MD5 hash:
7ac8528300b524bf5667cecaa8c277e4
SHA1 hash:
1559aa3883461697645e4ad34f7ad92195ea26a4
SH256 hash:
e1cc6a9d780602fe6e789bf5c3a27e87e197a4e3bf7c8138ea2f9dfec70fb963
MD5 hash:
f707252b9c9579677fffb013e0cfc646
SHA1 hash:
8ab483023fa8773afb8c13464c39c5b8e687f126
SH256 hash:
382dc91dfdf466b6335b4c1c51ac8166cdb7b0a1b1f89c38579f04aafbf54e6c
MD5 hash:
19bfee1e23f5ce8adb83a0fee1eb6489
SHA1 hash:
c0e955dc5bd431669ffa0aa85adfd490c957138d
SH256 hash:
d963923e272840267fa277042fe5b9e7f20363b2c51ddc65b00be9b91c3004ec
MD5 hash:
b39de12261b76b1be05e0727edd328ea
SHA1 hash:
7f3938d232090de009455c8677eacb76ae1e605b
SH256 hash:
4b5f35a8e69d6fdc6bc69dea86caa2ced5d74bcc22067d33c5fbacca237ca8d8
MD5 hash:
63c934c37102c8cf670aa84d18f33591
SHA1 hash:
93036bfc13d361d2ea61798574a9910abded640b
SH256 hash:
54d7a7600412cf9e2d83f43a9c72cc65c36856f092579a4722e86bf090b21dd9
MD5 hash:
ca738d5f13d20b6e98a5cb5c16cbb22a
SHA1 hash:
12bc5598bcfc0cf627f742b81c88ad52a870dbfa
SH256 hash:
8433ad1c1e9723270498990f20faae20aee061ff9266c5d46764ec307dc680ab
MD5 hash:
87b0cbaf38e13928d611c4eff86be8ef
SHA1 hash:
bb025dd86003c5e1c068e895828ea9749a684071
SH256 hash:
ebcfa5efbe161a53d0160d4703ff76f20cb9f75c4c740dbb9196e737ad29c6c1
MD5 hash:
27742b29c0e47b61a4470c0c14b4dd6c
SHA1 hash:
1897a266630a74140c3060ad07cbad1c2f207d2b
SH256 hash:
1f0e4291d164f0f63cd1f07a048ecf5fa1e4cf378d8a8c81f86782a40db66823
MD5 hash:
649d7a736b16fcd85e347a95d1fa07ca
SHA1 hash:
d07ee49e6fc40d1bc272a95159beaad0f7332247
SH256 hash:
5cdc889fa06b6c8cb2ea03a2c915e49681f02832dcbc91015ef4f098ab470eeb
MD5 hash:
83f027e6fc29286ff8705b4a9617ce17
SHA1 hash:
cd9a4ed3f0ad0dc8298435998edf6141d3db8563
SH256 hash:
5cccd82fbb3928236bb753a0c198f19d4338f0af1b4b8618a21fa5899fe5ac41
MD5 hash:
a02d9e097100e1e197344038e214817c
SHA1 hash:
c9e794b6ab39d7b182372e88124d3bada8031574
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.