MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 c082990403156e860fc5397a9d28d44325bcb24d24a97ad048f1d311a5109451. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
GCleaner
Vendor detections: 11
| SHA256 hash: | c082990403156e860fc5397a9d28d44325bcb24d24a97ad048f1d311a5109451 |
|---|---|
| SHA3-384 hash: | 0059aa06e4139832eb47f46e0b8314923532bedcbc2cf734f17a31ef03a3c77196a5f402d0eb85295120c9515efac1f4 |
| SHA1 hash: | c28671d261a7307d1e67e41a76e26c665ebb83eb |
| MD5 hash: | 8dbea443ed6b1c5c65b8d2b5b2fee229 |
| humanhash: | carolina-papa-failed-asparagus |
| File name: | C082990403156E860FC5397A9D28D44325BCB24D24A97.exe |
| Download: | download sample |
| Signature | GCleaner |
| File size: | 17'339'607 bytes |
| First seen: | 2022-01-26 22:50:48 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 101 x GuLoader, 64 x DiamondFox) |
| ssdeep | 393216:J51IqkYk5dLyW82AyR3DyElI2/f7AxSPlUhhQxFXhhp:J5Gqk9d+W8yR3Dybqf706yhyxFXhT |
| Threatray | 2'667 similar samples on MalwareBazaar |
| TLSH | T1640733E8FB51C75EC8B5E5F93AA84EDCC0124C6644701FAF78838877B1EA9B2B06C515 |
| File icon (PE): | |
| dhash icon | b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla) |
| Reporter | |
| Tags: | exe gcleaner |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| 185.215.113.29:20819 | https://threatfox.abuse.ch/ioc/334657/ |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Result
Signature
Behaviour
Result
Behaviour
Malware Config
159.69.246.184:13127
185.215.113.44:23759
45.9.20.221:15590
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | grakate_stealer_nov_2021 |
|---|
| Rule name: | INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables containing SQL queries to confidential data stores. Observed in infostealers |
| Rule name: | MALWARE_Win_DLInjector06 |
|---|---|
| Author: | ditekSHen |
| Description: | Detects downloader / injector |
| Rule name: | MALWARE_Win_RedLine |
|---|---|
| Author: | ditekSHen |
| Description: | Detects RedLine infostealer |
| Rule name: | MALWARE_Win_Vidar |
|---|---|
| Author: | ditekSHen |
| Description: | Detects Vidar / ArkeiStealer |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | Vidar |
|---|---|
| Author: | kevoreilly |
| Description: | Vidar Payload |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.