MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8fc055b97e29323ef0f570ef76b2bacdceb4f8d1b8a2eb62bb974f0abf03e5c0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GCleaner


Vendor detections: 8


Intelligence 8 IOCs YARA 6 File information Comments

SHA256 hash: 8fc055b97e29323ef0f570ef76b2bacdceb4f8d1b8a2eb62bb974f0abf03e5c0
SHA3-384 hash: 6fe034d608c185689df1e1541cd703723fcec562ce10ab79d3419e741974c837f095243e0ca01b508cfbd5fda20d0cc3
SHA1 hash: 6d16bcc29e8231280bc51ea3654aeb0eb7fe68e9
MD5 hash: 5fa50f91514c8771e9d0c8e789aca8b2
humanhash: wisconsin-cold-saturn-virginia
File name:5fa50f91514c8771e9d0c8e789aca8b2.exe
Download: download sample
Signature GCleaner
File size:1'766'828 bytes
First seen:2023-07-31 06:40:50 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash e569e6f445d32ba23766ad67d1e3787f (262 x Adware.Generic, 41 x RecordBreaker, 24 x RedLineStealer)
ssdeep 24576:s7FUDowAyrTVE3U5F/YpqKn8WvKic6QL3E2vVsjECUAQT45deRV9Rb:sBuZrEUS5VKIy029s4C1eH9t
TLSH T1D485CF3FF268A13EC5AA1B3245738310997BBA61B81A8C1E47FC344DCF765601E3B656
TrID 50.4% (.EXE) Inno Setup installer (109740/4/30)
19.7% (.EXE) InstallShield setup (43053/19/16)
19.1% (.EXE) Win32 EXE PECompact compressed (generic) (41569/9/9)
4.8% (.EXE) Win64 Executable (generic) (10523/12/4)
2.0% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 5050d270cccc82ae (109 x Adware.Generic, 43 x LummaStealer, 42 x OffLoader)
Reporter abuse_ch
Tags:exe gcleaner

Intelligence


File Origin
# of uploads :
1
# of downloads :
269
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
5fa50f91514c8771e9d0c8e789aca8b2.exe
Verdict:
No threats detected
Analysis date:
2023-07-31 06:42:13 UTC
Tags:
installer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a window
Creating a process from a recently created file
Сreating synchronization primitives
Searching for synchronization primitives
Searching for the window
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
control installer lolbin overlay packed setupapi shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
66 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected Generic Downloader
Yara detected Nymaim
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1282912 Sample: ouq3ougHvh.exe Startdate: 31/07/2023 Architecture: WINDOWS Score: 66 105 45.12.253.72 CMCSUS Germany 2->105 107 45.12.253.75 CMCSUS Germany 2->107 109 5 other IPs or domains 2->109 139 Snort IDS alert for network traffic 2->139 141 Found malware configuration 2->141 143 Malicious sample detected (through community Yara rule) 2->143 145 6 other signatures 2->145 11 ouq3ougHvh.exe 2 2->11         started        14 DigitalPulseService.exe 2->14         started        17 DigitalPulseService.exe 2->17         started        19 2 other processes 2->19 signatures3 process4 dnsIp5 103 C:\Users\user\AppData\...\ouq3ougHvh.tmp, PE32 11->103 dropped 21 ouq3ougHvh.tmp 3 26 11->21         started        133 bapp.digitalpulsedata.com 14->133 135 bapp.digitalpulsedata.com 17->135 file6 process7 dnsIp8 111 45.12.253.74, 49695, 80 CMCSUS Germany 21->111 113 downloads.digitalpulsedata.com 21->113 115 6 other IPs or domains 21->115 83 C:\Users\user\AppData\Local\Temp\...\s3.exe, PE32 21->83 dropped 85 C:\Users\user\AppData\Local\Temp\...\s0.exe, PE32 21->85 dropped 87 C:\Users\user\AppData\Local\Temp\...\s2.exe, PE32 21->87 dropped 89 3 other files (none is malicious) 21->89 dropped 25 s1.exe 21->25         started        28 s2.exe 21->28         started        30 s0.exe 14 21->30         started        34 s3.exe 21->34         started        file9 process10 dnsIp11 91 C:\Users\user\AppData\Local\Temp\...\s1.tmp, PE32 25->91 dropped 36 s1.tmp 25->36         started        93 C:\Users\user\AppData\Local\Temp\...\s2.tmp, PE32 28->93 dropped 40 s2.tmp 28->40         started        137 45.12.253.56, 49696, 80 CMCSUS Germany 30->137 151 Detected unpacking (changes PE section rights) 30->151 153 Detected unpacking (overwrites its own PE header) 30->153 43 cmd.exe 30->43         started        45 WerFault.exe 20 9 30->45         started        47 WerFault.exe 9 30->47         started        51 6 other processes 30->51 95 C:\Users\user\...\WebCompanionInstaller.exe, PE32 34->95 dropped 97 C:\...\WebCompanionInstaller.resources.dll, PE32 34->97 dropped 99 C:\...\WebCompanionInstaller.resources.dll, PE32 34->99 dropped 101 10 other files (none is malicious) 34->101 dropped 155 Multi AV Scanner detection for dropped file 34->155 49 WebCompanionInstaller.exe 34->49         started        file12 signatures13 process14 dnsIp15 67 C:\Users\user\AppData\...\unins000.exe (copy), PE32 36->67 dropped 69 C:\Users\user\AppData\...\is-VBD4E.tmp, PE32 36->69 dropped 71 C:\Users\user\AppData\...\is-2SA9I.tmp, PE32+ 36->71 dropped 79 2 other files (1 malicious) 36->79 dropped 147 Creates multiple autostart registry keys 36->147 53 DigitalPulseService.exe 36->53         started        56 _setup64.tmp 36->56         started        125 track.pinaview.com 188.114.96.7, 443, 49706, 49718 CLOUDFLARENETUS European Union 40->125 127 stats.pinaview.com 40->127 73 C:\Users\user\AppData\...\Pinaview.exe (copy), PE32 40->73 dropped 75 C:\Users\user\...\Pinaview.exe.config (copy), XML 40->75 dropped 77 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 40->77 dropped 81 17 other files (none is malicious) 40->81 dropped 58 Pinaview.exe 40->58         started        61 conhost.exe 43->61         started        63 taskkill.exe 43->63         started        129 192.168.2.1 unknown unknown 45->129 131 flow.lavasoft.com 104.17.8.52, 49735, 49737, 80 CLOUDFLARENETUS United States 49->131 file16 signatures17 process18 dnsIp19 117 bapp.digitalpulsedata.com 3.98.219.138, 443, 49702, 49709 AMAZON-02US United States 53->117 65 conhost.exe 56->65         started        119 trippinglyfast.com 176.9.20.82 HETZNER-ASDE Germany 58->119 121 quickyapongia.org 5.9.138.54 HETZNER-ASDE Germany 58->121 123 2 other IPs or domains 58->123 149 Creates multiple autostart registry keys 58->149 signatures20 process21
Threat name:
Win32.Trojan.OffLoader
Status:
Malicious
First seen:
2023-07-27 05:19:33 UTC
File Type:
PE (Exe)
Extracted files:
14
AV detection:
20 of 38 (52.63%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Executes dropped EXE
Loads dropped DLL
Unpacked files
SH256 hash:
a7e37f5314834b163fa21557e61c13c0f202fd64d3c0e46e6c90d2d02e033aec
MD5 hash:
6faec01bf7a3d7f5c5dee2e6e3143a58
SHA1 hash:
603a36f817cab5574e58ab279379e5c112e5fb37
SH256 hash:
b6ce5cdd33f0f20fd62ea0c6a6ceac69331aca3b17a90fa7fc0e44d07493fb6c
MD5 hash:
361d742e447a346e7f2f51cc1a6fd522
SHA1 hash:
ef1a2553bae7ea67da62e70896f2279813f1cb25
SH256 hash:
8fc055b97e29323ef0f570ef76b2bacdceb4f8d1b8a2eb62bb974f0abf03e5c0
MD5 hash:
5fa50f91514c8771e9d0c8e789aca8b2
SHA1 hash:
6d16bcc29e8231280bc51ea3654aeb0eb7fe68e9
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
Rule name:Windows_Trojan_Smokeloader_3687686f
Author:Elastic Security
Rule name:win_gcleaner_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.gcleaner.
Rule name:win_gcleaner_de41
Author:Johannes Bader
Description:detects GCleaner
Rule name:win_gcleaner_w0
Author:Johannes Bader @viql
Description:detects GCleaner

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments