MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 a61814efa6a532d5e946f145a5452da57326e3b048a26afd9882237af674a7aa. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
GCleaner
Vendor detections: 13
| SHA256 hash: | a61814efa6a532d5e946f145a5452da57326e3b048a26afd9882237af674a7aa |
|---|---|
| SHA3-384 hash: | a07728dfc6e88e6e4cc34b0201fd54e38f4541a82d5f4d13f1eef6f1957bdb90cbfe35151297f0a3f4aaed82e2cff5f3 |
| SHA1 hash: | e0ea2e7aefb66eede5b814991ccc5b5de53b2093 |
| MD5 hash: | c64912bd0ad4592c67cdcbb1afba4d0f |
| humanhash: | october-kitten-lithium-social |
| File name: | c64912bd0ad4592c67cdcbb1afba4d0f.exe |
| Download: | download sample |
| Signature | GCleaner |
| File size: | 343'040 bytes |
| First seen: | 2022-07-09 06:44:24 UTC |
| Last seen: | 2022-07-09 07:43:30 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | d1352e534403183ee67a752d94667cc4 (3 x Smoke Loader, 2 x RedLineStealer, 1 x GCleaner) |
| ssdeep | 6144:uZo3eoMQKwX1lU3L4aa6j8Dmab4k6cigafwVf:uZToMHwQJ37A4k65 |
| Threatray | 10'008 similar samples on MalwareBazaar |
| TLSH | T1F574D002BBA2DC70E8A12E30587197B51BB7FC621534960BF7B4771F2DB27806A75392 |
| TrID | 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 16.4% (.EXE) Win64 Executable (generic) (10523/12/4) 10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 7.8% (.EXE) Win16 NE executable (generic) (5038/12/1) 7.0% (.EXE) Win32 Executable (generic) (4505/5/1) |
| File icon (PE): | |
| dhash icon | b3f0e8686868e9bb (1 x GCleaner) |
| Reporter | |
| Tags: | exe gcleaner |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
31.210.20.149
212.192.241.16
Unpacked files
18611dcae62b67c4c20668fc9c2a68951771ab8f98106324a0ad00bc3a0fc88a
1d7adfdf90ca831a45425d3efd6ce639f2fece4f48f5b0a55d7fc5a645b9acc4
e1db3adcc4c401e8c97ac2e611646ab215343319b265c86346dff8b4e2bf905d
afb05f48bbae2b98bac394587d1352b9e5569e930d695230b21b73669be9c535
92af5f6f914082eaa1235c9ad0a2826db0beead07c3b25795829f7da90f83d59
371592f94e67f272e53786a8643058131f7d48edea6c709b6a7c4731ec6d2839
ba190bed2c9d862bae6ff089259090d300df3a253d1094314cc679af8ad890b2
bbc5780d11e999375d901fa9ebd8c3b4c9b3eff78513aa20774000ebd84e5b1c
a61814efa6a532d5e946f145a5452da57326e3b048a26afd9882237af674a7aa
b0b7af84e61ce5805ad317b113981aee691d96cbca0970a4db6d7777f4706b58
6f5943433e4cd2d3a1021f376334be10b3dd81757a5f30e928e12f5dc8cf154a
ebef7dcb2d186e10e2ab8da7c5eb75da1461ed684bf90c3abd54afa27ef79874
168db9afbe5c293f3ec6cabb476242e81add823382a5879ab78ecf7af6035f2a
1b0978a0a98bd88a39ecf38e36ed18b3d96a1db98eec62f7e5257e2bf7a4a153
ca0d985323d0497a5261faefad130b084d1084c28f748d964f1e5d4aaaf351d7
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | cobalt_strike_tmp01925d3f |
|---|---|
| Author: | The DFIR Report |
| Description: | files - file ~tmp01925d3f.exe |
| Reference: | https://thedfirreport.com |
| Rule name: | pdb_YARAify |
|---|---|
| Author: | @wowabiy314 |
| Description: | PDB |
| Rule name: | win_gcleaner_de41 |
|---|---|
| Author: | Johannes Bader |
| Description: | detects GCleaner |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.