MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 70a591efdee51fc69cc42a66eef90568bec4db03fb76bc3bcd42e790db372309. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GCleaner


Vendor detections: 12


Intelligence 12 IOCs YARA 3 File information Comments

SHA256 hash: 70a591efdee51fc69cc42a66eef90568bec4db03fb76bc3bcd42e790db372309
SHA3-384 hash: 84530d2557cc054a986a08e76fbc76a7654f7085213e9eb2ce5e1b064b16a5810ef5d842dd06acdad8e7ba9b7e4c184c
SHA1 hash: 22b034d2d6ed318a8b89e17e63dde580e7822db1
MD5 hash: 90eba377b11378ee37d7dd8cba30cbbb
humanhash: floor-jupiter-oscar-emma
File name:file
Download: download sample
Signature GCleaner
File size:1'652'013 bytes
First seen:2023-07-29 09:42:34 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 884310b1928934402ea6fec1dbd3cf5e (3'725 x GCleaner, 3'445 x Socks5Systemz, 262 x RaccoonStealer)
ssdeep 49152:D2jHS+QlXMfKmJeGiC6R5N1ZpzxgXtMhMxOV:qjAMimJvi1Lp6XtMhv
Threatray 2'762 similar samples on MalwareBazaar
TLSH T11A7533A195A18CBAE0FFCAB01A6C55018EBB7F51203DE564B6ECDC6C1E630B4DA0D735
TrID 50.8% (.EXE) Win32 Executable PowerBASIC/Win 9.x (148303/79/28)
37.6% (.EXE) Inno Setup installer (109740/4/30)
4.8% (.EXE) Win32 Executable Delphi generic (14182/79/4)
2.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
1.5% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon b298acbab2ca7a72 (2'327 x GCleaner, 1'631 x Socks5Systemz, 67 x RedLineStealer)
Reporter andretavare5
Tags:exe gcleaner


Avatar
andretavare5
Sample downloaded from http://45.12.253.74/pineapple.php?pub=mixinte

Intelligence


File Origin
# of uploads :
1
# of downloads :
277
Origin country :
US US
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
file
Verdict:
No threats detected
Analysis date:
2023-07-29 10:40:25 UTC
Tags:
installer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %temp% subdirectories
Creating a window
Creating a process from a recently created file
Сreating synchronization primitives
Creating a file in the Program Files subdirectories
Moving a file to the Program Files subdirectory
Launching the process to interact with network services
Modifying a system file
Launching a process
Creating a file in the %AppData% subdirectories
Running batch commands
Creating a process with a hidden window
Launching a tool to kill processes
Sending an HTTP GET request to an infection source
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
control greyware installer lolbin overlay packed shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
MinerDownloader, Nymaim, RedLine, Xmrig
Detection:
malicious
Classification:
troj.spyw.evad.mine
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Connects to a pastebin service (likely for C&C)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Encrypted powershell cmdline option found
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Sample uses process hollowing technique
Sigma detected: Schedule system process
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Generic MinerDownloader
Yara detected Nymaim
Yara detected RedLine Stealer
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1282105 Sample: file.exe Startdate: 29/07/2023 Architecture: WINDOWS Score: 100 99 45.12.253.98 CMCSUS Germany 2->99 117 Snort IDS alert for network traffic 2->117 119 Multi AV Scanner detection for domain / URL 2->119 121 Found malware configuration 2->121 123 16 other signatures 2->123 15 file.exe 2 2->15         started        signatures3 process4 file5 97 C:\Users\user\AppData\Local\...\file.exe.tmp, PE32 15->97 dropped 18 file.exe.tmp 11 102 15->18         started        process6 file7 81 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 18->81 dropped 83 C:\Users\user\AppData\Local\...\_iscrypt.dll, PE32 18->83 dropped 85 C:\...\unins000.exe (copy), PE32 18->85 dropped 87 8 other files (6 malicious) 18->87 dropped 21 FLSpacer729.exe 25 18->21         started        25 net.exe 1 18->25         started        process8 dnsIp9 101 45.12.253.56, 49699, 80 CMCSUS Germany 21->101 103 45.12.253.72, 49700, 80 CMCSUS Germany 21->103 105 45.12.253.75, 49701, 80 CMCSUS Germany 21->105 89 C:\Users\user\AppData\...\qyjDb5Zr4qdtnS.exe, PE32 21->89 dropped 91 C:\Users\user\AppData\...\roFAQLehcje.exe, PE32 21->91 dropped 93 C:\Users\user\AppData\Local\...\D4[1].file, PE32 21->93 dropped 27 roFAQLehcje.exe 1 21->27         started        30 cmd.exe 21->30         started        32 qyjDb5Zr4qdtnS.exe 21->32         started        34 conhost.exe 25->34         started        36 net1.exe 1 25->36         started        file10 process11 signatures12 145 Writes to foreign memory regions 27->145 147 Allocates memory in foreign processes 27->147 149 Injects a PE file into a foreign processes 27->149 38 AppLaunch.exe 15 6 27->38         started        43 WerFault.exe 9 27->43         started        45 conhost.exe 27->45         started        151 Encrypted powershell cmdline option found 30->151 153 Uses schtasks.exe or at.exe to add and modify task schedules 30->153 47 conhost.exe 30->47         started        49 taskkill.exe 30->49         started        155 Multi AV Scanner detection for dropped file 32->155 process13 dnsIp14 107 46.149.77.25, 49710, 8599 ASARTTELECOMRU Russian Federation 38->107 109 bloom-artists.com 85.187.128.34, 443, 49711 A2HOSTINGUS United States 38->109 95 C:\Users\user\...\winx32apideftype.exe, PE32 38->95 dropped 137 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 38->137 139 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 38->139 141 Tries to harvest and steal browser information (history, passwords, etc) 38->141 143 Tries to steal Crypto Currency Wallets 38->143 51 winx32apideftype.exe 38->51         started        file15 signatures16 process17 signatures18 125 Multi AV Scanner detection for dropped file 51->125 127 Writes to foreign memory regions 51->127 129 Allocates memory in foreign processes 51->129 131 2 other signatures 51->131 54 AppLaunch.exe 51->54         started        57 AppLaunch.exe 51->57         started        59 AppLaunch.exe 51->59         started        61 WerFault.exe 51->61         started        process19 signatures20 133 Injects a PE file into a foreign processes 54->133 63 AppLaunch.exe 54->63         started        68 conhost.exe 54->68         started        process21 dnsIp22 111 github.com 140.82.121.4, 443, 49714, 49715 GITHUBUS United States 63->111 113 pastebin.com 104.20.67.143, 443, 49713 CLOUDFLARENETUS United States 63->113 79 C:\ProgramData\HostData\logs.uce, ASCII 63->79 dropped 115 Sample is not signed and drops a device driver 63->115 70 cmd.exe 63->70         started        73 cmd.exe 63->73         started        75 cmd.exe 63->75         started        file23 signatures24 process25 signatures26 135 Encrypted powershell cmdline option found 70->135 77 conhost.exe 70->77         started        process27
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2023-07-29 09:43:05 UTC
File Type:
PE (Exe)
Extracted files:
5
AV detection:
15 of 24 (62.50%)
Threat level:
  5/5
Result
Malware family:
gcleaner
Score:
  10/10
Tags:
family:gcleaner discovery loader
Behaviour
Kills process with taskkill
Runs net.exe
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Checks installed software on the system
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
GCleaner
Malware Config
C2 Extraction:
45.12.253.56
45.12.253.72
45.12.253.98
45.12.253.75
Unpacked files
SH256 hash:
eee62cd6c1750360f8185d8281e6d9c33c95ca814445b4b0bc86d87456ee2038
MD5 hash:
2e2369958f1d526890606d509de5a5c5
SHA1 hash:
da8ebf900b2f04e02dd544f509f4d71e2c085b67
SH256 hash:
dfc134e02b331affc24cecde8fd79376ffe4a1dfdb232a62a850c1611d934d2d
MD5 hash:
40bb3fb8a538d56a784480fc5ab790e7
SHA1 hash:
8eb7b4a178208345895271d4f99c79543bf4fa72
SH256 hash:
3476e6af17ffda39a656f8084831d27daceafc1448a859fdc6cda88bfdd82292
MD5 hash:
a20c11298cf7a5c285d278deba5e1130
SHA1 hash:
24ef52c779f8b059c49634ee941f95994568c3ff
SH256 hash:
70a591efdee51fc69cc42a66eef90568bec4db03fb76bc3bcd42e790db372309
MD5 hash:
90eba377b11378ee37d7dd8cba30cbbb
SHA1 hash:
22b034d2d6ed318a8b89e17e63dde580e7822db1
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
Rule name:win_gcleaner_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.gcleaner.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Dropped by
PrivateLoader
  
Delivery method
Distributed via drive-by

Comments