MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 924a590604b3a536902d2401a9502ad9deac2c13aaa0d8f4cad11688eccc9ff3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
GCleaner
Vendor detections: 14
| SHA256 hash: | 924a590604b3a536902d2401a9502ad9deac2c13aaa0d8f4cad11688eccc9ff3 |
|---|---|
| SHA3-384 hash: | 5279a1e1b6af0e23d57a7af11c943ed2ce2fb74b6cca60bd36f903e82a241120ee34049a3d0e1e31513ba07338291834 |
| SHA1 hash: | d4ab7e0fb4cdaab4bc5f0e4bdfa0bf30a04d2fed |
| MD5 hash: | 43044f8125611ffd97673ef7bfdfd3ef |
| humanhash: | oklahoma-montana-johnny-sixteen |
| File name: | 43044f8125611ffd97673ef7bfdfd3ef.exe |
| Download: | download sample |
| Signature | GCleaner |
| File size: | 317'952 bytes |
| First seen: | 2022-10-25 09:20:08 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 9277faa69a3b2f155b9e8565ccbc8235 (7 x RedLineStealer, 4 x Tofsee, 4 x ArkeiStealer) |
| ssdeep | 6144:fZYnKniLh3SpzjoCYEN7fk70FU7L0lYCt5R:fZYnKi1CpzjoCvjkoF8L0lTt5 |
| TLSH | T17064E1323AC0C032D67B21358971DA752ABFB87416315A8B7BE413699F316E2DB31787 |
| TrID | 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 16.4% (.EXE) Win64 Executable (generic) (10523/12/4) 10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 7.8% (.EXE) Win16 NE executable (generic) (5038/12/1) 7.0% (.EXE) Win32 Executable (generic) (4505/5/1) |
| File icon (PE): | |
| dhash icon | 0e71e86969696969 (1 x GCleaner) |
| Reporter | |
| Tags: | exe gcleaner |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
85.31.46.167
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | pdb_YARAify |
|---|---|
| Author: | @wowabiy314 |
| Description: | PDB |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.