MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ad8da7f38644aa54c0983c703436a872daecd353e1470e831aa209e0b37f837e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GCleaner


Vendor detections: 12


Intelligence 12 IOCs 2 YARA 1 File information Comments

SHA256 hash: ad8da7f38644aa54c0983c703436a872daecd353e1470e831aa209e0b37f837e
SHA3-384 hash: 7343fc8dec50c29ac9694602deaff6825cfebc0be283d60cf3103178a2c25bd661fb697b4c7e67b9c8ac345c95d923f9
SHA1 hash: 39378ecfb484426c8347e7dc0e150a36c16a4ed0
MD5 hash: a53558362da836cb34eb0e4ce796167f
humanhash: fix-social-nitrogen-hydrogen
File name:a53558362da836cb34eb0e4ce796167f.exe
Download: download sample
Signature GCleaner
File size:7'771'200 bytes
First seen:2022-01-30 10:25:51 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 101 x GuLoader, 64 x DiamondFox)
ssdeep 196608:JkuFE79Sn1Owd3mItKU4Tt4908/hfbV77TtDR0an98dZa7t3Lc0:JS8n1Owc7F49rJTVxiy98dQ7t39
Threatray 622 similar samples on MalwareBazaar
TLSH T13E76336B779D4E57DEA52F3228D98318330051106FADB54B2310A49CE27EDAB9EFD2C4
File icon (PE):PE icon
dhash icon b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla)
Reporter abuse_ch
Tags:exe gcleaner


Avatar
abuse_ch
GCleaner C2:
157.90.17.156:56409

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
157.90.17.156:56409 https://threatfox.abuse.ch/ioc/366514/
92.255.57.115:11841 https://threatfox.abuse.ch/ioc/366527/

Intelligence


File Origin
# of uploads :
1
# of downloads :
224
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
a53558362da836cb34eb0e4ce796167f.exe
Verdict:
No threats detected
Analysis date:
2022-01-30 10:28:25 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Сreating synchronization primitives
Creating a process from a recently created file
Creating a file
DNS request
Searching for the window
Running batch commands
Sending a custom TCP request
Sending an HTTP GET request
Launching a process
Creating a window
Searching for synchronization primitives
Creating a process with a hidden window
Launching the default Windows debugger (dwwin.exe)
Launching cmd.exe command interpreter
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
control.exe overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Clipboard Hijacker RedLine SmokeLoader S
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disables Windows Defender (via service or powershell)
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file has a writeable .text section
PE file has nameless sections
Performs DNS queries to domains with low reputation
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses process hollowing technique
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to evade analysis by execution special instruction which cause usermode exception
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected Clipboard Hijacker
Yara detected Costura Assembly Loader
Yara detected Generic Downloader
Yara detected onlyLogger
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Socelars
Yara detected WebBrowserPassView password recovery tool
Yara Genericmalware
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 562823 Sample: zx4AMX5P5x.exe Startdate: 30/01/2022 Architecture: WINDOWS Score: 100 85 183.78.205.92 YOUNGDOONG-AS-KRLGHelloVisionCorpKR Korea Republic of 2->85 87 185.38.142.132 NETSOLUTIONSNL Portugal 2->87 89 10 other IPs or domains 2->89 141 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->141 143 Malicious sample detected (through community Yara rule) 2->143 145 Antivirus detection for URL or domain 2->145 147 23 other signatures 2->147 12 zx4AMX5P5x.exe 10 2->12         started        signatures3 process4 file5 75 C:\Users\user\AppData\...\setup_installer.exe, PE32 12->75 dropped 15 setup_installer.exe 24 12->15         started        process6 file7 77 C:\Users\user\AppData\...\setup_install.exe, PE32 15->77 dropped 79 C:\Users\...\61f1b2e3e52c1_Wed2093e7059.exe, PE32 15->79 dropped 81 C:\...\61f1b2e2cf025_Wed20604bb8d4d1.exe, PE32 15->81 dropped 83 19 other files (12 malicious) 15->83 dropped 18 setup_install.exe 1 15->18         started        process8 dnsIp9 91 hornygl.xyz 172.67.202.104, 49775, 80 CLOUDFLARENETUS United States 18->91 93 127.0.0.1 unknown unknown 18->93 149 Performs DNS queries to domains with low reputation 18->149 151 Disables Windows Defender (via service or powershell) 18->151 22 cmd.exe 1 18->22         started        24 cmd.exe 18->24         started        26 cmd.exe 18->26         started        28 13 other processes 18->28 signatures10 process11 signatures12 31 61f1b2cf8e374_Wed209af3ef0.exe 22->31         started        35 61f1b2d243f95_Wed20b0c24e8b53.exe 24->35         started        38 61f1b2db86747_Wed20942041.exe 26->38         started        153 Obfuscated command line found 28->153 155 Disables Windows Defender (via service or powershell) 28->155 40 61f1b2d45bdd8_Wed20245ebe5a.exe 28->40         started        42 61f1b2d878434_Wed208b3d6c1da.exe 28->42         started        44 61f1b2dbe109b_Wed203fb762e77.exe 28->44         started        46 7 other processes 28->46 process13 dnsIp14 95 185.215.113.10 WHOLESALECONNECTIONSNL Portugal 31->95 109 Multi AV Scanner detection for dropped file 31->109 111 Detected unpacking (changes PE section rights) 31->111 113 Detected unpacking (overwrites its own PE header) 31->113 131 4 other signatures 31->131 97 ip-api.com 208.95.112.1, 49767, 80 TUT-ASUS United States 35->97 99 www.hhiuew33.com 45.136.151.102, 49792, 49798, 80 ENZUINC-US Latvia 35->99 61 C:\Users\user\AppData\Local\Temp\11111.exe, PE32 35->61 dropped 115 Antivirus detection for dropped file 35->115 117 May check the online IP address of the machine 35->117 119 Machine Learning detection for dropped file 35->119 48 11111.exe 35->48         started        121 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 38->121 123 Maps a DLL or memory area into another process 38->123 133 2 other signatures 38->133 105 3 other IPs or domains 40->105 63 C:\Users\user\AppData\Local\...\fw4[1].exe, PE32 40->63 dropped 65 C:\Users\user\AppData\Local\...\fw3[1].exe, PE32 40->65 dropped 67 C:\Users\user\AppData\Roaming\DFA6.tmp.exe, PE32 40->67 dropped 69 C:\Users\user\AppData\Roaming\AABA.tmp.exe, PE32 40->69 dropped 125 Sample uses process hollowing technique 42->125 127 Injects a PE file into a foreign processes 42->127 101 cdn.discordapp.com 162.159.130.233, 443, 49780 CLOUDFLARENETUS United States 44->101 71 C:\Users\user\AppData\Local\...\LzmwAqmV.exe, PE32 44->71 dropped 103 176.123.1.95 ALEXHOSTMD Moldova Republic of 46->103 107 2 other IPs or domains 46->107 73 C:\Users\user\AppData\Local\Temp\~uSk.cpl, PE32 46->73 dropped 129 Found evasive API chain (trying to detect sleep duration tampering with parallel thread) 46->129 51 cmd.exe 46->51         started        53 cmd.exe 46->53         started        file15 signatures16 process17 signatures18 135 Multi AV Scanner detection for dropped file 48->135 137 Machine Learning detection for dropped file 48->137 139 Tries to harvest and steal browser information (history, passwords, etc) 48->139 55 conhost.exe 51->55         started        57 timeout.exe 51->57         started        59 conhost.exe 53->59         started        process19
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2022-01-28 19:46:58 UTC
File Type:
PE (Exe)
Extracted files:
400
AV detection:
22 of 28 (78.57%)
Threat level:
  5/5
Result
Malware family:
socelars
Score:
  10/10
Tags:
family:onlylogger family:redline family:smokeloader family:socelars botnet:20kprofessor2 botnet:media262231 botnet:newmast2 botnet:update aspackv2 backdoor discovery infostealer loader persistence spyware stealer trojan upx
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Delays execution with timeout.exe
Enumerates processes with tasklist
Kills process with taskkill
Modifies Internet Explorer settings
Modifies data under HKEY_USERS
Modifies registry class
Modifies system certificate store
Runs ping.exe
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Drops file in System32 directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Looks up geolocation information via web service
Drops startup file
Loads dropped DLL
Reads user/profile data of web browsers
ASPack v2.12-2.42
Downloads MZ/PE file
Drops file in Drivers directory
Executes dropped EXE
UPX packed file
OnlyLogger Payload
OnlyLogger
Process spawned unexpected child process
RedLine
RedLine Payload
SmokeLoader
Socelars
Socelars Payload
Suspicious use of NtCreateUserProcessOtherParentProcess
Malware Config
C2 Extraction:
http://www.anquyebt.com/
185.215.113.10:39759
157.90.17.156:56409
92.255.57.115:11841
169.197.141.182:47320
http://abpa.at/upload/
http://emaratghajari.com/upload/
http://d7qw.cn/upload/
http://alumik-group.ru/upload/
http://zamkikurgan.ru/upload/
Unpacked files
SH256 hash:
6f727b49bd59c587c69cce00353f7b1ffc71812535a5e399522d8952cd845ecf
MD5 hash:
080547edadadfc9d23ea33dccd8cb9a6
SHA1 hash:
e3c2a07846b5f85f262234acba9afe2367f52a49
SH256 hash:
8dc5a9d34d4c2334dac65c684c7b02d922c8c0a4fe6e214f797d854b6925b66d
MD5 hash:
eb77f09de1ee911469b7c2ae9b905774
SHA1 hash:
6661893082e92df26bf3914955bb348b2449dc51
SH256 hash:
f7f0c9be1f35e7c9627b0712b53e1151f709ddf7a4a1c75b64307e1349ba26f4
MD5 hash:
f1649a995b6562d9cff5e2d3f0baad1c
SHA1 hash:
1da349d3f4d3d1266dd5900ff9758a7d577f1a5a
SH256 hash:
b1254b899fb566b3e1260859abf5208cadd560838dcc954fc4949593a316a005
MD5 hash:
c766287655728eb9507e3ec7f5875328
SHA1 hash:
7b990bc9d16c69ac0f9302bad39219db168df1b4
SH256 hash:
06d8294720be7342d4e6ea124b4ef0425727d55648db7c7220513b2d6e0c5f05
MD5 hash:
cdf00253597651ddbd7c319d0685ff46
SHA1 hash:
c10b20ed8d410c17c5396da6de3cdcd1c0ba9e98
SH256 hash:
6460754c17ab602b0ddfd2a82e637748b4a54139f6dbefa848ff01722a077acc
MD5 hash:
64638fe3e9d9acbcfe027bac3d0a7fab
SHA1 hash:
ff0d35497c4d6676a01a57db299df9847b382126
SH256 hash:
685ea0ce82eaa9138bda3eb94d56ec87a6ca48a77e466a843f392300ff709a74
MD5 hash:
4ce3c8a7d7ec4fc4c020f6be14d5473f
SHA1 hash:
9be67f189acec67ca065d1dab0243d9bd7c1e71c
SH256 hash:
f60816afc4878a48da64d9c56029fdd1192dc5e30fd3b84f0736e02ea1279ce4
MD5 hash:
919f7ffad4526c4744d5ff749a71c95c
SHA1 hash:
8903a8bc8051c2bfb2d570ab420b1913af5f9c7f
SH256 hash:
52a77b73120b6a5716c2b84cae5e2c773f3ec43b84daf4ee0f8d071ec933df48
MD5 hash:
a6760b43486421c54810323a0bf14b1d
SHA1 hash:
6844a1ddcec0c7099938edf1dcb7b47f62c93e06
SH256 hash:
6a0acf709e69e0b77b9016cd82383ad9e9e03de5f87029a9a191c978ec709f7d
MD5 hash:
08ea44c8fc37f08c142bede036a21e2b
SHA1 hash:
5ded8c02bb8087384e35e8c3b201d921633506f4
SH256 hash:
4795816f6329a5da74a993e101b3b40f65fa1d8371bb328ef8184b37a7ea61a4
MD5 hash:
7b17f8f82bd57062bf36de9f0c41be8a
SHA1 hash:
1bd8773da3966d9fe48947f317d5a21fc1b9d3bc
SH256 hash:
6c830b1737f03443207bfa2c040360e4080334928f8bbff3b5563de49a82a6dd
MD5 hash:
5f4b8d26ff73871df3dc4e43da98fed7
SHA1 hash:
180e27bdddd8fb838f2084160ec57181741cf318
SH256 hash:
e2beaf61ef8408e20b5dd05ffab6e1a62774088b3acdebd834f51d77f9824112
MD5 hash:
ce54b9287c3e4b5733035d0be085d989
SHA1 hash:
07a17e423bf89d9b056562d822a8f651aeb33c96
SH256 hash:
446bac7dfdbacfaad14eb3db3bd2826a29356dff628905bd2380cca373822b5e
MD5 hash:
79e2acb405dad780dbcd954c452e6f3b
SHA1 hash:
026f9abd0865d7dd5b4db210131e1fb46627dc99
SH256 hash:
e1cc6a9d780602fe6e789bf5c3a27e87e197a4e3bf7c8138ea2f9dfec70fb963
MD5 hash:
f707252b9c9579677fffb013e0cfc646
SHA1 hash:
8ab483023fa8773afb8c13464c39c5b8e687f126
SH256 hash:
a7c864d00f3e1289f08710f5a47be1909c34fedb5a20066418fc804ffd61cea5
MD5 hash:
c8cdbc18bea69c8802c311a520c8e56e
SHA1 hash:
a440d612dfd453526653f0338a247c0ea86def45
SH256 hash:
9912e7f9e9c18f46e965ca48ed65de8a28de7d301336500aaa5fd461e948822f
MD5 hash:
32404da1b26037746f9bf0d5628ea968
SHA1 hash:
8d2bf53983638235d5cc2f81171839801ba02e84
SH256 hash:
245a869dc8a9bcb2190b5da3ea234740d79798385784e8db7aa3f2d2745192aa
MD5 hash:
4f93004835598b36011104e6f25dbdba
SHA1 hash:
6cb45092356c54f68d26f959e4a05ce80ef28483
SH256 hash:
565cb30a640d5cb469f9d93c969aab083fa14dfdf983411c132927665531795c
MD5 hash:
83b531c1515044f8241cd9627fbfbe86
SHA1 hash:
d2f7096e18531abb963fc9af7ecc543641570ac8
SH256 hash:
a7e37f5314834b163fa21557e61c13c0f202fd64d3c0e46e6c90d2d02e033aec
MD5 hash:
6faec01bf7a3d7f5c5dee2e6e3143a58
SHA1 hash:
603a36f817cab5574e58ab279379e5c112e5fb37
SH256 hash:
04b1333df19a052ea2e6ae0895e22babd248abece04b9f3d8168fbfe50204385
MD5 hash:
80b9f03f1e5ee0fda5c6ef24d0862ccd
SHA1 hash:
0f214b4d6688c4692851f84ea6cbab0b87afebfe
SH256 hash:
73c23f00c98090ec5cdf7c8a48067fcc1d01bb51102cc6f2ab3c6bd802db6c6a
MD5 hash:
e661c67b9d196d76b24b86f7625ca3f6
SHA1 hash:
86f34a6abbd445663bc5164fe121ddaab5ce1108
SH256 hash:
e2a1ad80823b3608f42a75851a1b4894e9b5cbd9fd187976bf2f0c5f744e6d3b
MD5 hash:
5448f100c279443f84dcba648bbf3ed8
SHA1 hash:
30b86205cd43cd80e07224fc7a0607e1372e272c
SH256 hash:
4407a801dcf19a959dc1c24f6ddd1dc82a721b44737f9b7c5395ecb4ec012601
MD5 hash:
706fe6c65a6db9aaf41ba1fcdcf2fa74
SHA1 hash:
9dfde47b86b278df3c095b4cde297e5ce840d0b7
SH256 hash:
663e3400f481d9e2d35369ac50a5ab806e8ef0e6dc2817520d6a09e9e1a951e1
MD5 hash:
de457de2336065812313c6a59dad6a77
SHA1 hash:
b26671198a1079f81f8ed4ba62c17883fa5cc255
SH256 hash:
72e78544b4ab2b67b84682360b8f6fe9e956988822b35f4fbcfef14b1feb38ab
MD5 hash:
ea8a2ecbdbe1b4d6dec38076a3b33ac1
SHA1 hash:
3e0a2b2d98d552f8ec745ed6f6d1bba6d2a2dd31
SH256 hash:
262803e878dc500cb0e3ba33925ba0e668a656d9c4bec0dc52d8433132bdee01
MD5 hash:
42a99f4b39bf2ddb6d5a3cd8793e26c4
SHA1 hash:
e9aaa663a5db64954597f1bcbcec54c976a53698
SH256 hash:
816717638fe6aa8accc258f3af8e0bec5e3c4d02f61a326c4dea50f939bc8872
MD5 hash:
1c9dabe2c79560a4c6fb0141f95bb929
SHA1 hash:
97a3a3386cf7c13951d3477e72b193d566c5327e
SH256 hash:
02a949ce50fdb5ce59f2c3d3ddddc58d4a4bf2c57b79e296723f25863a080928
MD5 hash:
cf4d01df6e183eaef59e5c2d9f93da6c
SHA1 hash:
2ce8268ddf249372e1531b470e6e18c1079862cb
SH256 hash:
ad8da7f38644aa54c0983c703436a872daecd353e1470e831aa209e0b37f837e
MD5 hash:
a53558362da836cb34eb0e4ce796167f
SHA1 hash:
39378ecfb484426c8347e7dc0e150a36c16a4ed0
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments