MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 69d05690af03960099a0472b90d12dd55a57365a5aaf98b7bb87570bb47bf2c4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GCleaner


Vendor detections: 13


Intelligence 13 IOCs YARA File information Comments

SHA256 hash: 69d05690af03960099a0472b90d12dd55a57365a5aaf98b7bb87570bb47bf2c4
SHA3-384 hash: cad785a63e9a1a761a890714ded2be3060a13607babcf9328fc1f5c61932264b4c7e22a1b6504f6c41db766f43ec1e6f
SHA1 hash: d3ea7b7c945d8a56042a15efe18fbf3f00f411cd
MD5 hash: 6cd920ce4a0c898304c99cbdde91f4fe
humanhash: finch-vermont-robin-network
File name:6cd920ce4a0c898304c99cbdde91f4fe.exe
Download: download sample
Signature GCleaner
File size:288'768 bytes
First seen:2022-06-13 07:06:51 UTC
Last seen:2022-06-13 07:59:23 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash fcf93cfa7c44bfd0dcdd0f36932caab3 (2 x Smoke Loader, 1 x GCleaner, 1 x RecordBreaker)
ssdeep 6144:RA6JvuBoSSldgIvQ+r8Huzl+WCkVMyOeh:Tt9SSzgjhO3CzyVh
TLSH T14954F1127FA0C473E83BB430A8B1A572267B784615749DC777A8073A5F65BA01F383A7
TrID 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
16.4% (.EXE) Win64 Executable (generic) (10523/12/4)
10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.0% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 9bf8f4f4e4f4b4b0 (1 x GCleaner)
Reporter abuse_ch
Tags:exe gcleaner

Intelligence


File Origin
# of uploads :
2
# of downloads :
227
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
6cd920ce4a0c898304c99cbdde91f4fe.exe
Verdict:
Malicious activity
Analysis date:
2022-06-13 07:20:02 UTC
Tags:
loader evasion trojan opendir rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Sending a custom TCP request
Sending an HTTP GET request
Сreating synchronization primitives
Running batch commands
Creating a process with a hidden window
Launching a tool to kill processes
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
SystemUptime
EvasionGetTickCount
EvasionQueryPerformanceCounter
CheckCmdLine
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
76 / 100
Signature
Antivirus detection for URL or domain
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Yara detected Nymaim
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.RealProtectPENG
Status:
Malicious
First seen:
2022-06-13 06:49:42 UTC
File Type:
PE (Exe)
Extracted files:
8
AV detection:
20 of 26 (76.92%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Kills process with taskkill
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Checks computer location settings
Deletes itself
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

GCleaner

Executable exe 69d05690af03960099a0472b90d12dd55a57365a5aaf98b7bb87570bb47bf2c4

(this sample)

  
Delivery method
Distributed via web download

Comments