MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 9641c0804bc2ab3393b6cad5de2ad28f83bf126c8570f1d2d3e4a03c31134842. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
GCleaner
Vendor detections: 12
| SHA256 hash: | 9641c0804bc2ab3393b6cad5de2ad28f83bf126c8570f1d2d3e4a03c31134842 |
|---|---|
| SHA3-384 hash: | c6f903bb3d8a251a0c140e269f73f2e2be279d65d2ec05468fbd88697a52804b5dd460aac30e2d0d5c9049043e018e7c |
| SHA1 hash: | c99361c35301c2d6218c41fd0ac961bfad697813 |
| MD5 hash: | ae6f81f3ad7c331fceb5087d9a65ac61 |
| humanhash: | massachusetts-moon-mountain-march |
| File name: | ae6f81f3ad7c331fceb5087d9a65ac61.exe |
| Download: | download sample |
| Signature | GCleaner |
| File size: | 301'568 bytes |
| First seen: | 2022-05-30 04:20:13 UTC |
| Last seen: | 2022-05-30 04:45:05 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f5b352298d89c175aa8d8d46bf23e0e6 (1 x Tofsee, 1 x GCleaner) |
| ssdeep | 6144:Z4/2VJVDrMjV9KHlGwfBml9iD2UYYj7qreX2FJb:6/4fAS0wfDDZJfqreXAV |
| TLSH | T16D54F15238B0CC32E8F675340DB5C8252A7B7C325475858676E0227EAFB1B91AB70F97 |
| TrID | 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 16.4% (.EXE) Win64 Executable (generic) (10523/12/4) 10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 7.8% (.EXE) Win16 NE executable (generic) (5038/12/1) 7.0% (.EXE) Win32 Executable (generic) (4505/5/1) |
| File icon (PE): | |
| dhash icon | b371696969696986 (1 x GCleaner) |
| Reporter | |
| Tags: | exe gcleaner |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | win_gcleaner_de41 |
|---|---|
| Author: | Johannes Bader |
| Description: | detects GCleaner |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.