MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 9ba5d1ef1463744611330846a585f8c536a1897f84ad9a606a40c6fd19941d31. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
GCleaner
Vendor detections: 11
| SHA256 hash: | 9ba5d1ef1463744611330846a585f8c536a1897f84ad9a606a40c6fd19941d31 |
|---|---|
| SHA3-384 hash: | 647322e91c4951d7b41a2efde4bcf75708a3e884116befe95bb2e8ac21307ec1524e01b2c01575936c1423c62c016320 |
| SHA1 hash: | 338693e9f4031e656e5722c531f9f92eee9dcf69 |
| MD5 hash: | b74e785b3756d363f820921a8a5f6ac6 |
| humanhash: | finch-kilo-potato-pizza |
| File name: | file |
| Download: | download sample |
| Signature | GCleaner |
| File size: | 250'880 bytes |
| First seen: | 2022-08-29 00:04:42 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 2a3abe3f2c2c4342ffe3930eed2d0e9b (15 x Smoke Loader, 6 x GCleaner, 4 x RedLineStealer) |
| ssdeep | 6144:k6gnFGcgh+OVUkbTcCyiW3TLqON+IhRnt:ergh1UOT+r/FN+Ih |
| TLSH | T19234026B7CD11436E479F1301473CA5253BBAC531A356B8F7BA8226ACFA1AC059B03D7 |
| TrID | 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 16.4% (.EXE) Win64 Executable (generic) (10523/12/4) 10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 7.8% (.EXE) Win16 NE executable (generic) (5038/12/1) 7.0% (.EXE) Win32 Executable (generic) (4505/5/1) |
| File icon (PE): | |
| dhash icon | b3f0ecece4e4e8e9 (1 x GCleaner) |
| Reporter | |
| Tags: | exe gcleaner |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Unpacked files
b52b963f2cab290ff855244f4c137895e948f70eef1758726cbb7a213422fc7a
376fc33d5c20c6e1efea6f48107b7d47cb495bee30ee4399a8c8414cb4e3cd25
75853bf35de8c920a0677e8cecac41996442b91e2f356cb6b1c99bc5484d93eb
66fc0aa6891f78a1bdac72ec1df7e741a50149483866e9908cd23f17129168f0
c90bfe9e250fc2c0e919ddafbc339650f1c0dba946eef6f5be2c1a5495d423f1
b662b543993363a471ac9782d6283eb8ab31f719aac37e7232446365ce6d4814
d4c083507b17a513e245b71d9d6b1b6fb94dcf5088f1d424cdc8f100e5b35281
5ead35ef9d42c2d687ae376a6fed4aace3812a047b629a2cf52c6baa8a10a556
17057d67afff5ff9bfc15ab93f6d5e1c2052c35eb8532117795b491e4e8957f9
0b29c27842c6e5d8ac7fd76318855ed32bdea6d98ab085d60ebef2870a8c012f
9ba5d1ef1463744611330846a585f8c536a1897f84ad9a606a40c6fd19941d31
e5212f777d9dd317c18d50c5fa6a31c1370cd63bc59e9c01a3364caceb52b6c7
efe0742345c9ba2a1ea7077966b34c3ef14010415b4d8158d41b84487f07e78c
73bde03add63bcab4ae7a671d47f05eb223b4cd65e4599d3bd66cc57418367e8
182d2a3a25313c6285e8e7faaafd51641b4da014cfbbb4637e6c090bb9487ef6
c95772a3c786a43f3bb71d6575f37ebfcc4dc03720270ec58bf0a27a202be691
cc99441832427a9ae4e2b67860bbbaddf91ca20e6c063b8fee429d8a4b8c19e1
308b9d686f10b6164f3334c657fdefb82cd9209845e50b78679452db9cd08368
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | cobalt_strike_tmp01925d3f |
|---|---|
| Author: | The DFIR Report |
| Description: | files - file ~tmp01925d3f.exe |
| Reference: | https://thedfirreport.com |
| Rule name: | pdb_YARAify |
|---|---|
| Author: | @wowabiy314 |
| Description: | PDB |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.