MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 912534a5380738d96e8ddb7873ecb004667d72d5df783cabce2e398c11b14912. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GCleaner


Vendor detections: 15


Intelligence 15 IOCs 1 YARA File information Comments

SHA256 hash: 912534a5380738d96e8ddb7873ecb004667d72d5df783cabce2e398c11b14912
SHA3-384 hash: 4cc9ace411eaa3b749cc0c9d1ae0df2258d61ce1d96c917ffa81822a0ec392f4c9f09347741bfa2295ec778ec3557a07
SHA1 hash: e827272cd42a9030741f4acb6004a97f6e13ba40
MD5 hash: 8b7b82eb83d4a6760ecf8e9398ffda64
humanhash: xray-johnny-mirror-pennsylvania
File name:912534A5380738D96E8DDB7873ECB004667D72D5DF783.exe
Download: download sample
Signature GCleaner
File size:4'250'831 bytes
First seen:2021-12-04 22:26:59 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 32569d67dc210c5cb9a759b08da2bdb3 (122 x RedLineStealer, 42 x DiamondFox, 37 x RaccoonStealer)
ssdeep 98304:xECvLUBsg2UgIhYr0/6nicI8HIDfPg6aiwm0CPtNXQCslQymye0:xZLUCgUIuw/6i8oDfY6Bwm0QtNX52Qp0
TLSH T16B163381B2CF98F3CE055874DB8C5BB9607EC6E62F684DC377288A4A57AC841D17F885
File icon (PE):PE icon
dhash icon 848c5454baf47474 (2'088 x Adware.Neoreklami, 101 x RedLineStealer, 33 x DiamondFox)
Reporter abuse_ch
Tags:exe gcleaner


Avatar
abuse_ch
GCleaner C2:
62.182.157.172:33718

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
62.182.157.172:33718 https://threatfox.abuse.ch/ioc/259591/

Intelligence


File Origin
# of uploads :
1
# of downloads :
294
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
912534A5380738D96E8DDB7873ECB004667D72D5DF783.exe
Verdict:
No threats detected
Analysis date:
2021-12-04 22:30:29 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %temp% subdirectories
Сreating synchronization primitives
Creating a process from a recently created file
Running batch commands
Sending a custom TCP request
Searching for synchronization primitives
Launching a process
Launching the default Windows debugger (dwwin.exe)
Creating a process with a hidden window
Creating a window
DNS request
Query of malicious DNS domain
Unauthorized injection to a recently created process
Result
Malware family:
n/a
Score:
  0/10
Tags:
n/a
Behaviour
CheckCmdLine
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
barys overlay packed socelars
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine Socelars Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
Adds a directory exclusion to Windows Defender
Antivirus detection for dropped file
Antivirus detection for URL or domain
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates HTML files with .exe extension (expired dropper behavior)
Disable Windows Defender real time protection (registry)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Script Execution From Temp Folder
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected Costura Assembly Loader
Yara detected RedLine Stealer
Yara detected Socelars
Yara detected Vidar stealer
Yara Genericmalware
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 534003 Sample: 912534A5380738D96E8DDB7873E... Startdate: 04/12/2021 Architecture: WINDOWS Score: 100 58 208.95.112.1 TUT-ASUS United States 2->58 60 104.208.16.94 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 2->60 62 7 other IPs or domains 2->62 76 Antivirus detection for URL or domain 2->76 78 Antivirus detection for dropped file 2->78 80 Multi AV Scanner detection for dropped file 2->80 82 15 other signatures 2->82 9 912534A5380738D96E8DDB7873ECB004667D72D5DF783.exe 21 2->9         started        signatures3 process4 file5 42 C:\Users\user\AppData\...\setup_install.exe, PE32 9->42 dropped 44 C:\Users\user\...\Mon06f9c53ffae25af61.exe, PE32 9->44 dropped 46 C:\Users\user\...\Mon06dc62fb7183b9e.exe, PE32 9->46 dropped 48 16 other files (10 malicious) 9->48 dropped 12 setup_install.exe 1 9->12         started        process6 dnsIp7 74 127.0.0.1 unknown unknown 12->74 104 Adds a directory exclusion to Windows Defender 12->104 16 cmd.exe 12->16         started        18 cmd.exe 1 12->18         started        20 cmd.exe 1 12->20         started        22 7 other processes 12->22 signatures8 process9 signatures10 25 Mon0630c6f1115ad5.exe 16->25         started        30 Mon06f9c53ffae25af61.exe 18->30         started        32 Mon06885bbdb13fec3.exe 14 2 20->32         started        84 Adds a directory exclusion to Windows Defender 22->84 34 Mon067df200a8fd43b.exe 22->34         started        36 Mon06d47d8fde50.exe 22->36         started        38 Mon06dc62fb7183b9e.exe 14 13 22->38         started        40 2 other processes 22->40 process11 dnsIp12 64 37.0.10.199 WKD-ASIE Netherlands 25->64 66 37.0.10.244 WKD-ASIE Netherlands 25->66 72 20 other IPs or domains 25->72 50 C:\Users\...\xFaFx_Szk00JnPF7AvMMVAeu.exe, PE32 25->50 dropped 52 C:\Users\...\i4HzLCX9ix_xgRHB3fQN7Sf0.exe, PE32+ 25->52 dropped 54 C:\Users\...\So_nQ0f6036W5A_oTVjjj7ec.exe, PE32 25->54 dropped 56 52 other files (17 malicious) 25->56 dropped 86 Antivirus detection for dropped file 25->86 88 Creates HTML files with .exe extension (expired dropper behavior) 25->88 90 Tries to harvest and steal browser information (history, passwords, etc) 25->90 92 Disable Windows Defender real time protection (registry) 25->92 94 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 30->94 96 Maps a DLL or memory area into another process 30->96 98 Checks if the current machine is a virtual machine (disk enumeration) 30->98 68 8.8.8.8 GOOGLEUS United States 32->68 70 162.159.129.233 CLOUDFLARENETUS United States 32->70 100 Machine Learning detection for dropped file 32->100 102 Injects a PE file into a foreign processes 36->102 file13 signatures14
Threat name:
Win32.Spyware.Socelars
Status:
Malicious
First seen:
2021-12-04 01:22:00 UTC
File Type:
PE (Exe)
Extracted files:
138
AV detection:
22 of 28 (78.57%)
Threat level:
  2/5
Verdict:
malicious
Result
Malware family:
Score:
  10/10
Tags:
family:redline family:smokeloader family:socelars family:vidar botnet:706 botnet:janesam botnet:nanani aspackv2 backdoor discovery evasion infostealer spyware stealer trojan
Behaviour
Checks SCSI registry key(s)
Creates scheduled task(s)
Kills process with taskkill
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Looks up geolocation information via web service
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
Vidar Stealer
Modifies Windows Defender Real-time Protection settings
RedLine
RedLine Payload
SmokeLoader
Socelars
Socelars Payload
Suspicious use of NtCreateProcessExOtherParentProcess
Vidar
Malware Config
C2 Extraction:
http://www.iyiqian.com/
http://www.xxhufdc.top/
http://www.uefhkice.xyz/
http://www.znsjis.top/
https://petrenko96.tumblr.com/
http://varmisende.com/upload/
http://fernandomayol.com/upload/
http://nextlytm.com/upload/
http://people4jan.com/upload/
http://asfaltwerk.com/upload/
65.108.20.195:6774
45.142.215.47:27643
Unpacked files
SH256 hash:
0fbd853a669d4590b44cda0525f41aa99175133be439db7ca9cd575a2af2636b
MD5 hash:
bb4e4f419dbe419d5cdca7e8534ac023
SHA1 hash:
cdacd0ad82dcefa585734e751b1cea42161a9033
SH256 hash:
36d5afdcb0fa8d512656aa5a59f34018885bb1b9dd5cc0780766552809cfb45f
MD5 hash:
4f9c74430d72b9500a0d99cc28fc7a7e
SHA1 hash:
a67cf6a62a6cabec501aa2f14e97c48b71dbd97c
SH256 hash:
fea58ea431672f1c19c3188e2799febb7109562536c61891c5b09e9234b00606
MD5 hash:
a02fcf1984e958501da2ef4ac1565559
SHA1 hash:
b97003d8ce7c98c70a7a17a90b13f07046b9e129
SH256 hash:
558762206aeb3e95d5238df12d04ea042c0d6fa1d16945d41669823177626758
MD5 hash:
84141e18fcbfb78e995820c8a3d91919
SHA1 hash:
8f375e116fdb924954ab4135e2fb973101ef61ac
SH256 hash:
5f463952815ce4f763e9f4b3b72ed70ad82f74a69a271fc2b1588055c3fec4cc
MD5 hash:
21775ff041e7277d87aa8fdf1e09da6c
SHA1 hash:
6dd1d6716cb93adef6c9b39490a79e77fd5396c9
SH256 hash:
894300eca1742f48ed61be1043d3cb9924e89522c24b0f01b7cceb261a1fa073
MD5 hash:
7c82c868054a4fc8a5f6337a55f8d82e
SHA1 hash:
279ef02de285cbaf873e1ac2794406baa1f84f19
SH256 hash:
e427f8ef21691e3d8c2313d11129ad08ddef69a158eca2f77c170603478ff0c4
MD5 hash:
0dedd909aae9aa0a89b4422106310e9e
SHA1 hash:
271d36afa5b729ee590cf8066166ca5e9c9d0340
SH256 hash:
03d079303a3164960677e57a587e86c3a5e7736fbde0ab7b9e60c4b8b2e50745
MD5 hash:
ae0bb0ef615f4606fbe1f050b6f08ca3
SHA1 hash:
f69b6d6496d8941ef53bca7c3578ad616cf5a4b1
SH256 hash:
fbc75a565c0d1896171feb728d011c1a91c0d9548e0e529a76dcf0a6679d1f20
MD5 hash:
d9bdc8a637733704c3b25360ae0f8d07
SHA1 hash:
e40a87a4226f9f31ae9df39b61ed501f356c70b2
SH256 hash:
e8c6ba1c1f91c9cac35402fe3878a9bd2e14daa23503b691ca622fefdad94f7f
MD5 hash:
e9e407c69fbd0bd0ef47259798ed5a8e
SHA1 hash:
df51f1ce2cbd5db5c5fde30ebc582b48ab6bd6e4
SH256 hash:
11d3500b3da7ebcf1575263485d1e6c0c995c4775c91291346191012791667af
MD5 hash:
e03680c90591496bada8fc7db6139f59
SHA1 hash:
af1de55205dae97a47df674801d301a6eb8e3471
SH256 hash:
1d04bbabdb6da4db379ca057ac0d63fb27d8891b01cf3ffcb94573be1853ecaf
MD5 hash:
d58b4be4f3dec4843801511def20ae7d
SHA1 hash:
90be9caf1efa58d6ea70ae6783bfc8e05bd9ea16
SH256 hash:
1e50bead67a29eaeec16eb7f67ae9624e2e117c21838753b339f8dedcc1d0819
MD5 hash:
34a48b5bb71c3e586ab70823760ab20a
SHA1 hash:
4a2a5053f44be79b897a9c126befbdf32df5c4d3
SH256 hash:
00f43f5cfa6aea34fc6b0f21acb7cf2b82d57047732ef781f19a1ba319aaf1cc
MD5 hash:
99ca75fc71354d2f501566c7205928a9
SHA1 hash:
23397cd12c5ff791826ba97e65737de785d7efb6
SH256 hash:
bb2945f781f40e44e726cff767c2ff22a04fea840f3396215851e93e2b6b215e
MD5 hash:
d58aa0f3060aaff76a3faad86670ced2
SHA1 hash:
20ed6c79a560dc2f63a3e4b541989c4545934f07
SH256 hash:
bbe7d6e50b7b2229d023aa7170b52d2fa3e63646c6232c25102fa121d1a4534e
MD5 hash:
9535f08bd5920f84ac344f8884fe155d
SHA1 hash:
05acf56d12840558ebc17a138d4390dad7a96d5a
SH256 hash:
c9513c0be9864d06ffc483260f0e79ddeb0b2b8d805976384ee31c0628fee901
MD5 hash:
ac64c3fff08ee8ce352766ef57aa45d7
SHA1 hash:
02b0ed5fc2a4fe3b9c7145c15c5ecb631d1ca7b8
SH256 hash:
ff236ccbd61d322a223e3152e768d0a195bde866d4debbe98929a80946382832
MD5 hash:
14b846dbd77dbedb574227310467d5fb
SHA1 hash:
01318111c3ae602914839f4f44f66dc095f3aa51
SH256 hash:
3a924457ad70770ebd0d7fcb98094473236f3135dd916c90b2a37f26e32ff3d5
MD5 hash:
675d81d3a257e808f2e71e3313c834eb
SHA1 hash:
8cbf0818b0fdb2e63d6f0c9d60d7b510a8ad8a44
SH256 hash:
a835d3c4baa029a407a32b29b55cdfe10127dcfd906323bbce050caf4f5818a0
MD5 hash:
0399c89a7b383e371553485d80e47374
SHA1 hash:
5ab2320b04e6b60d48671ad3b0c6c296c8182d72
SH256 hash:
6dbb8e19ae7920d930e4520754985aa13aaa8452575b78a67096db52286f81b0
MD5 hash:
887ea9ba0c70e6050407be1bc12bebd9
SHA1 hash:
632e2d0730ba08ca887d9b3b927fa524ab32502d
SH256 hash:
c9010724d05f7325aabc3d20398506323c4a0d778e28c366474fb3d3145af375
MD5 hash:
451845539b9b980b84d245e34853a8a6
SHA1 hash:
c4703edbe372f660869685a6462d27ab392f9fdc
SH256 hash:
44b9b6078a5cd9b5a25aa8a66add33999d4837cd7dce6a7a7224c3ab1b79008c
MD5 hash:
0164618be630f5b5f3ba60bb2d01e4df
SHA1 hash:
5321f9653fba0f4b372a36ea89c29647be85f2b9
Detections:
win_socelars_auto
SH256 hash:
912534a5380738d96e8ddb7873ecb004667d72d5df783cabce2e398c11b14912
MD5 hash:
8b7b82eb83d4a6760ecf8e9398ffda64
SHA1 hash:
e827272cd42a9030741f4acb6004a97f6e13ba40
Malware family:
SmokeLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments