MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 baa0dd2902580029c9eeadb90eb209e9c3526615f3002159c528d48c0c0414fa. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GCleaner


Vendor detections: 15


Intelligence 15 IOCs YARA 7 File information Comments

SHA256 hash: baa0dd2902580029c9eeadb90eb209e9c3526615f3002159c528d48c0c0414fa
SHA3-384 hash: 8c76480e328af2c5b76f258586b71856a2b60f3c1e028b8e12a7f25615f827db653c43d6f4a28f9d52c65ba83867971a
SHA1 hash: b8dc96ef022aa5dff7361d0d4d3c784cb0e23068
MD5 hash: 2882c11acf786a8f50642a0904658019
humanhash: nitrogen-kansas-jersey-georgia
File name:SecuriteInfo.com.Trojan.Inject5.57588.6332.0
Download: download sample
Signature GCleaner
File size:3'497'760 bytes
First seen:2025-06-22 00:25:27 UTC
Last seen:2025-06-22 01:25:08 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 8d9b89a9ca98e0f47fd4f2589e97a409 (24 x GCleaner)
ssdeep 49152:zvI8gzxsO/fVUFs469GSxflVsfJ9qkGAG6gvCemFdB5XXVqPVeOoW:LI8gB/iFs4Ox2LqkGP6tlHEVx
TLSH T10CF5F10FB65CDD7AD2F61A3C1C059157C774A942993D064BB7C08C486763AEFBC283AA
TrID 52.9% (.EXE) Win32 Executable Delphi generic (14182/79/4)
16.8% (.EXE) Win32 Executable (generic) (4504/4/1)
7.7% (.EXE) Win16/32 Executable Delphi generic (2072/23)
7.5% (.EXE) OS/2 Executable (generic) (2029/13)
7.4% (.EXE) Generic Win/DOS Executable (2002/3)
Magika pebin
Reporter SecuriteInfoCom
Tags:exe gcleaner

Intelligence


File Origin
# of uploads :
2
# of downloads :
648
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
SecuriteInfo.com.Trojan.Inject5.57588.6332.0
Verdict:
Malicious activity
Analysis date:
2025-06-22 00:26:24 UTC
Tags:
delphi gcleaner loader auto generic

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
97.4%
Tags:
delphi cobalt emotet
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a window
Creating a file in the %temp% directory
Creating a process from a recently created file
DNS request
Connection attempt
Sending a custom TCP request
Unauthorized injection to a recently created process by context flags manipulation
Connection attempt to an infection source
Sending an HTTP GET request to an infection source
Result
Threat name:
CryptOne
Detection:
malicious
Classification:
troj.evad
Score:
80 / 100
Signature
Antivirus detection for dropped file
Found hidden mapped module (file has been removed from disk)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Writes to foreign memory regions
Yara detected CryptOne packer
Behaviour
Behavior Graph:
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PE (Portable Executable) Win 32 Exe x86
Threat name:
Win32.Trojan.Egairtigado
Status:
Malicious
First seen:
2025-06-22 00:26:31 UTC
File Type:
PE (Exe)
Extracted files:
38
AV detection:
21 of 24 (87.50%)
Threat level:
  5/5
Result
Malware family:
gcleaner
Score:
  10/10
Tags:
family:gcleaner discovery loader
Behaviour
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Executes dropped EXE
Loads dropped DLL
Downloads MZ/PE file
GCleaner
Gcleaner family
Malware Config
C2 Extraction:
45.91.200.135
Unpacked files
SH256 hash:
baa0dd2902580029c9eeadb90eb209e9c3526615f3002159c528d48c0c0414fa
MD5 hash:
2882c11acf786a8f50642a0904658019
SHA1 hash:
b8dc96ef022aa5dff7361d0d4d3c784cb0e23068
SH256 hash:
e736389378e91b3d96701822d29deb657fa8d7b3da1d93430c70236917b697bd
MD5 hash:
d2f15c47e3baa1062ab4232f5d7ca851
SHA1 hash:
7a2170fec90546f3d9054616ccc35ca483d4d2e5
Detections:
GCleaner
Parent samples :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 hash:
0a0b083cc0e62db594b7be21088202c7fe0970d609b2847085d0bf2be8e54a5c
MD5 hash:
4ce3ce196eda86d92b68362b6269b618
SHA1 hash:
fd42ee0aca0315acac25c297f1ce33634c549559
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BobSoftMiniDelphiBoBBobSoft
Author:malware-lu
Rule name:Borland
Author:malware-lu
Rule name:nuso
Author:Michelle Khalil
Description:This rule detects unpacked nuso malware samples.
Rule name:pe_detect_tls_callbacks
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments