MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 88c44434bfc18a43db7b95517faad86f6578e41e363491898940bca95eefe7c8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GCleaner


Vendor detections: 15


Intelligence 15 IOCs YARA 26 File information Comments

SHA256 hash: 88c44434bfc18a43db7b95517faad86f6578e41e363491898940bca95eefe7c8
SHA3-384 hash: 188b188da35b4542506186f59c6b8a58bbd625e0e0adf12877931a54136ff016f91f2932b3a585e476a88015d1f1d211
SHA1 hash: d45ff6d8467c68b602a2ed313e101d431aa847d0
MD5 hash: 7be179b132965bb1bfbbf50aef2672e8
humanhash: minnesota-apart-yellow-fanta
File name:🔐 𝐒𝐄𝐓𝐔𝐏 📘.exe
Download: download sample
Signature GCleaner
File size:3'662'112 bytes
First seen:2025-08-19 21:56:59 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 426c703e3fd97399764ca95cae6c78e8 (13 x GCleaner)
ssdeep 98304:ZMUx3bM6O9e0CvYW8uasJeZu2MqaZg4DE8K:ZJ46O0xf8Iek2Mqam4DEv
TLSH T12C06E011B2625827DC93507EF92FE6A434DF2E47B9D8EE7116AC3B0C1E6B350349A253
TrID 52.9% (.EXE) Win32 Executable Delphi generic (14182/79/4)
16.8% (.EXE) Win32 Executable (generic) (4504/4/1)
7.7% (.EXE) Win16/32 Executable Delphi generic (2072/23)
7.5% (.EXE) OS/2 Executable (generic) (2029/13)
7.4% (.EXE) Generic Win/DOS Executable (2002/3)
Magika pebin
dhash icon 399998ecd4d46c0e (572 x Quakbot, 137 x ArkeiStealer, 82 x GCleaner)
Reporter aachum
Tags:exe gcleaner


Avatar
iamaachum
https://www.file-hosters.com/ => https://mega.nz/file/CoojBAAC#KmEz39KE887iUK6fiPbjcQQO_yn0XSOtmyQpQ0Tqa8w

GCleaner C2: 176.46.158.23

Intelligence


File Origin
# of uploads :
1
# of downloads :
53
Origin country :
ES ES
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
fb81d9d4-46ce-438b-93cc-bc02c6ecca7b
Verdict:
Malicious activity
Analysis date:
2025-08-19 22:03:43 UTC
Tags:
gcleaner loader telegram lumma stealer inno installer delphi

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
delphi emotet cobalt
Result
Verdict:
Malware
Maliciousness:
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
adaptive-context borland_delphi fingerprint invalid-signature keylogger obfuscated packed packed packer_detected signed threat
Result
Threat name:
Amadey, CryptOne, GCleaner, LummaC Steal
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Changes security center settings (notifications, updates, antivirus, firewall)
Contains functionality to detect sleep reduction / modifications
Contains functionality to start a terminal service
Detected CypherIt Packer
Detected unpacking (changes PE section rights)
Drops executables to the windows directory (C:\Windows) and starts them
Drops PE files with a suspicious file extension
Found hidden mapped module (file has been removed from disk)
Found malware configuration
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Joe Sandbox ML detected suspicious sample
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Reads the Security eventlog
Reads the System eventlog
Sample uses string decryption to hide its real strings
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Search for Antivirus process
Sigma detected: Suspicious New Service Creation
Sigma detected: Suspicious Script Execution From Temp Folder
Suricata IDS alerts for network traffic
Switches to a custom stack to bypass stack traces
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Tries to steal from password manager
Writes to foreign memory regions
Yara detected Amadey
Yara detected Amadeys Clipper DLL
Yara detected CryptOne packer
Yara detected GCleaner
Yara detected LummaC Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1760623 Sample: #Ud83d#Udd10 #Ud835#Udc12#U... Startdate: 20/08/2025 Architecture: WINDOWS Score: 100 133 94.154.35.25 SELECTELRU Ukraine 2->133 135 185.156.73.98 RELDAS-NETRU Russian Federation 2->135 137 12 other IPs or domains 2->137 151 Suricata IDS alerts for network traffic 2->151 153 Found malware configuration 2->153 155 Antivirus / Scanner detection for submitted sample 2->155 157 19 other signatures 2->157 12 #Ud83d#Udd10 #Ud835#Udc12#Ud835#Udc04#Ud835#Udc13#Ud835#Udc14#Ud835#Udc0f #Ud83d#Udcd8.exe 2 2->12         started        16 1U34Y3.exe 2->16         started        18 svchost.exe 1 1 2->18         started        21 8 other processes 2->21 signatures3 process4 dnsIp5 119 C:\Users\user\AppData\...\svchost015.exe, PE32 12->119 dropped 121 C:\Users\user\AppData\Local\...\svc7F3F.tmp, PE32 12->121 dropped 183 Writes to foreign memory regions 12->183 185 Maps a DLL or memory area into another process 12->185 23 svchost015.exe 45 12->23         started        123 C:\Windows\7lUxWrGz.exe, PE32 16->123 dropped 187 Contains functionality to start a terminal service 16->187 189 Drops executables to the windows directory (C:\Windows) and starts them 16->189 191 Reads the Security eventlog 16->191 193 Reads the System eventlog 16->193 27 7lUxWrGz.exe 16->27         started        30 cmd.exe 16->30         started        32 cmd.exe 16->32         started        34 cmd.exe 16->34         started        139 127.0.0.1 unknown unknown 18->139 195 System process connects to network (likely due to code injection or exploit) 18->195 141 play.google.com 21->141 197 Changes security center settings (notifications, updates, antivirus, firewall) 21->197 36 WerFault.exe 2 21->36         started        38 WerFault.exe 21->38         started        file6 signatures7 process8 dnsIp9 143 drive.usercontent.google.com 142.251.40.193, 443, 49694 GOOGLEUS United States 23->143 145 176.46.158.23, 49698, 49699, 49708 ESTPAKEE Iran (ISLAMIC Republic Of) 23->145 105 C:\Users\user\AppData\...\t9u6vjsP6PiKK.exe, PE32 23->105 dropped 107 C:\Users\user\AppData\...\h6Wk6S2x52sK6.exe, PE32 23->107 dropped 109 C:\Users\user\AppData\...\cSoNNuS1QSP6.exe, PE32 23->109 dropped 111 7 other files (2 malicious) 23->111 dropped 40 h6Wk6S2x52sK6.exe 1 4 23->40         started        43 t9u6vjsP6PiKK.exe 23->43         started        47 cSoNNuS1QSP6.exe 23->47         started        49 4i90LQQRbmkHT.exe 23->49         started        165 Multi AV Scanner detection for dropped file 27->165 167 Contains functionality to start a terminal service 27->167 51 conhost.exe 30->51         started        53 icacls.exe 30->53         started        55 conhost.exe 32->55         started        57 icacls.exe 32->57         started        59 2 other processes 34->59 file10 signatures11 process12 dnsIp13 113 C:\Users\user\AppData\Local\...\1U34Y3.exe, PE32 40->113 dropped 115 C:\Users\user\AppData\Local\...\2U5202.exe, PE32 40->115 dropped 61 1U34Y3.exe 40->61         started        147 t.me 149.154.167.99, 443, 49717 TELEGRAMRU United Kingdom 43->147 171 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 43->171 173 Query firmware table information (likely to detect VMs) 43->173 175 Tries to harvest and steal browser information (history, passwords, etc) 43->175 181 2 other signatures 43->181 149 runmgov.ru 144.172.106.140, 443, 49703, 49720 PONYNETUS United States 47->149 177 Detected unpacking (changes PE section rights) 47->177 179 Contains functionality to detect sleep reduction / modifications 47->179 65 WerFault.exe 19 16 47->65         started        117 C:\Users\user\AppData\Local\...\nsExec.dll, PE32 49->117 dropped 67 cmd.exe 49->67         started        file14 signatures15 process16 file17 127 C:\Windows\winloghelper.exe, PE32 61->127 dropped 129 C:\Windows\systemhelper.exe, PE32 61->129 dropped 199 Contains functionality to start a terminal service 61->199 69 cmd.exe 61->69         started        72 cmd.exe 61->72         started        74 cmd.exe 61->74         started        81 5 other processes 61->81 76 cmd.exe 67->76         started        79 conhost.exe 67->79         started        signatures18 process19 file20 159 Detected CypherIt Packer 69->159 161 Bypasses PowerShell execution policy 69->161 163 Drops PE files with a suspicious file extension 69->163 83 conhost.exe 69->83         started        85 icacls.exe 69->85         started        87 net.exe 72->87         started        89 conhost.exe 72->89         started        97 2 other processes 74->97 125 C:\Users\user\AppData\Local\Temp\...\Anal.pif, PE32 76->125 dropped 91 Anal.pif 76->91         started        94 extrac32.exe 76->94         started        99 4 other processes 76->99 101 10 other processes 81->101 signatures21 process22 file23 103 net1.exe 87->103         started        169 Switches to a custom stack to bypass stack traces 91->169 131 C:\Users\user\AppData\Local\Temp\Photoshop, iAPX 94->131 dropped signatures24 process25
Gathering data
Threat name:
Win32.Trojan.Gcleaner
Status:
Malicious
First seen:
2025-08-19 22:08:51 UTC
File Type:
PE (Exe)
Extracted files:
38
AV detection:
21 of 24 (87.50%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
discovery
Behaviour
Suspicious use of WriteProcessMemory
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Executes dropped EXE
Loads dropped DLL
Unpacked files
SH256 hash:
0a0b083cc0e62db594b7be21088202c7fe0970d609b2847085d0bf2be8e54a5c
MD5 hash:
4ce3ce196eda86d92b68362b6269b618
SHA1 hash:
fd42ee0aca0315acac25c297f1ce33634c549559
SH256 hash:
88c44434bfc18a43db7b95517faad86f6578e41e363491898940bca95eefe7c8
MD5 hash:
7be179b132965bb1bfbbf50aef2672e8
SHA1 hash:
d45ff6d8467c68b602a2ed313e101d431aa847d0
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BobSoftMiniDelphiBoBBobSoft
Author:malware-lu
Rule name:Borland
Author:malware-lu
Rule name:Check_OutputDebugStringA_iat
Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:CP_AllMal_Detector
Author:DiegoAnalytics
Description:CrossPlatform All Malwares Detector: Detect PE, ELF, Mach-O, scripts, archives; overlay, obfuscation, encryption, spoofing, hiding, high entropy, network communication
Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:meth_stackstrings
Author:Willi Ballenthin
Rule name:pe_detect_tls_callbacks
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:SHA512_Constants
Author:phoul (@phoul)
Description:Look for SHA384/SHA512 constants
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

GCleaner

Executable exe 88c44434bfc18a43db7b95517faad86f6578e41e363491898940bca95eefe7c8

(this sample)

  
Delivery method
Distributed via web download

Comments