MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a071db1acb51e629aeb194a9a960116581c3cef7be5dd7af11d55a291fe90357. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GCleaner


Vendor detections: 16


Intelligence 16 IOCs YARA 5 File information Comments

SHA256 hash: a071db1acb51e629aeb194a9a960116581c3cef7be5dd7af11d55a291fe90357
SHA3-384 hash: e19ca943ba99b540747a86cb41a028e5a2f1c538a76620b70967a8606a20e0a51fa44b8730b0abc8b58e63c6753b99ad
SHA1 hash: 547a87e91e4bc5a602b6206e7a28aba2b131b5ae
MD5 hash: e79a2ca4d3c75fe98824183759ca8d92
humanhash: finch-november-timing-beryllium
File name:random.exe
Download: download sample
Signature GCleaner
File size:3'675'424 bytes
First seen:2025-10-22 12:46:49 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash bdd3b011b3121d6f72f040e7e4e18cb9 (2 x GCleaner)
ssdeep 49152:gnqlR5xxCzkrlL3hJOjfHijPvGfpLtw69nFxEuR9pZSa56Tl3F3Y7GNCQBa3f:go70+RhSfSeVf4TNF3gX
Threatray 202 similar samples on MalwareBazaar
TLSH T11E06E0309DD24CA1E0273139C81FB195E51B7E4EFAF6FBE40DF329146D2A1E14AB61A1
TrID 52.9% (.EXE) Win32 Executable Delphi generic (14182/79/4)
16.8% (.EXE) Win32 Executable (generic) (4504/4/1)
7.7% (.EXE) Win16/32 Executable Delphi generic (2072/23)
7.5% (.EXE) OS/2 Executable (generic) (2029/13)
7.4% (.EXE) Generic Win/DOS Executable (2002/3)
Magika pebin
Reporter abuse_ch
Tags:exe gcleaner

Intelligence


File Origin
# of uploads :
1
# of downloads :
80
Origin country :
SE SE
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
random.exe
Verdict:
Malicious activity
Analysis date:
2025-10-22 12:55:19 UTC
Tags:
gcleaner loader auto generic

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
delphi cobalt emotet
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a window
Searching for synchronization primitives
Creating a file in the %temp% directory
Creating a process from a recently created file
DNS request
Connection attempt
Sending a custom TCP request
Sending an HTTP GET request
Unauthorized injection to a recently created process by context flags manipulation
Connection attempt to an infection source
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
adaptive-context anti-debug base64 borland_delphi expired-cert fingerprint invalid-signature keylogger packed signed
Verdict:
Malicious
File Type:
exe x32
First seen:
2025-10-22T09:53:00Z UTC
Last seen:
2025-10-23T08:02:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan.Win32.Agentb.gen
Result
Threat name:
CryptOne, GCleaner
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Found malware configuration
Hijacks the control flow in another process
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Injects a PE file into a foreign processes
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Suricata IDS alerts for network traffic
Writes to foreign memory regions
Yara detected CryptOne packer
Yara detected GCleaner
Behaviour
Behavior Graph:
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PE (Portable Executable) PE File Layout Win 32 Exe x86
Threat name:
Win32.Trojan.Fragtor
Status:
Malicious
First seen:
2025-10-22 12:47:41 UTC
File Type:
PE (Exe)
Extracted files:
36
AV detection:
20 of 24 (83.33%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
discovery
Behaviour
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Executes dropped EXE
Downloads MZ/PE file
Unpacked files
SH256 hash:
d3d3224b50e7ff955cba76e05f5058471add627c6f15658420146040192b3e1b
MD5 hash:
61f30fea94c55ee3199526448a73e58f
SHA1 hash:
71c175173df87bda7ffc77b2208b28f04bbdc628
SH256 hash:
d592c2afeb4ecf5a2760144db81cc05f0ec3969e7f1f574ec6959b3118ab1846
MD5 hash:
55d8cdb64b4e600ffd5734fce111f27c
SHA1 hash:
8813af367306eccc25ed690f51e170fc330fd315
Detections:
GCleaner
SH256 hash:
a071db1acb51e629aeb194a9a960116581c3cef7be5dd7af11d55a291fe90357
MD5 hash:
e79a2ca4d3c75fe98824183759ca8d92
SHA1 hash:
547a87e91e4bc5a602b6206e7a28aba2b131b5ae
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BobSoftMiniDelphiBoBBobSoft
Author:malware-lu
Rule name:Borland
Author:malware-lu
Rule name:pe_detect_tls_callbacks
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

GCleaner

Executable exe a071db1acb51e629aeb194a9a960116581c3cef7be5dd7af11d55a291fe90357

(this sample)

  
Delivery method
Distributed via web download

Comments