MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c082990403156e860fc5397a9d28d44325bcb24d24a97ad048f1d311a5109451. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GCleaner


Vendor detections: 11


Intelligence 11 IOCs 1 YARA 8 File information Comments

SHA256 hash: c082990403156e860fc5397a9d28d44325bcb24d24a97ad048f1d311a5109451
SHA3-384 hash: 0059aa06e4139832eb47f46e0b8314923532bedcbc2cf734f17a31ef03a3c77196a5f402d0eb85295120c9515efac1f4
SHA1 hash: c28671d261a7307d1e67e41a76e26c665ebb83eb
MD5 hash: 8dbea443ed6b1c5c65b8d2b5b2fee229
humanhash: carolina-papa-failed-asparagus
File name:C082990403156E860FC5397A9D28D44325BCB24D24A97.exe
Download: download sample
Signature GCleaner
File size:17'339'607 bytes
First seen:2022-01-26 22:50:48 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 101 x GuLoader, 64 x DiamondFox)
ssdeep 393216:J51IqkYk5dLyW82AyR3DyElI2/f7AxSPlUhhQxFXhhp:J5Gqk9d+W8yR3Dybqf706yhyxFXhT
Threatray 2'667 similar samples on MalwareBazaar
TLSH T1640733E8FB51C75EC8B5E5F93AA84EDCC0124C6644701FAF78838877B1EA9B2B06C515
File icon (PE):PE icon
dhash icon b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla)
Reporter abuse_ch
Tags:exe gcleaner


Avatar
abuse_ch
GCleaner C2:
185.215.113.29:20819

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
185.215.113.29:20819 https://threatfox.abuse.ch/ioc/334657/

Intelligence


File Origin
# of uploads :
1
# of downloads :
205
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
C082990403156E860FC5397A9D28D44325BCB24D24A97.exe
Verdict:
No threats detected
Analysis date:
2022-01-26 22:54:18 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Сreating synchronization primitives
Creating a process from a recently created file
Creating a file
DNS request
Searching for the window
Running batch commands
Launching a process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
barys control.exe overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Result
Threat name:
Raccoon RedLine SmokeLoader Socelars Vid
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Disable Windows Defender real time protection (registry)
Disables Windows Defender (via service or powershell)
Found C&C like URL pattern
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Found stalling execution ending in API Sleep call
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Query firmware table information (likely to detect VMs)
Sigma detected: MSHTA Spawning Windows Shell
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious MSHTA Process Patterns
Sigma detected: Suspicious Script Execution From Temp Folder
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to evade analysis by execution special instruction which cause usermode exception
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected onlyLogger
Yara detected Raccoon Stealer
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Socelars
Yara detected Vidar stealer
Yara detected WebBrowserPassView password recovery tool
Yara Genericmalware
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 560871 Sample: C082990403156E860FC5397A9D2... Startdate: 26/01/2022 Architecture: WINDOWS Score: 100 79 ip-api.com 208.95.112.1, 49749, 80 TUT-ASUS United States 2->79 81 mstdn.social 116.202.14.219, 443, 49768, 49853 HETZNER-ASDE Germany 2->81 83 24 other IPs or domains 2->83 87 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->87 89 Antivirus detection for URL or domain 2->89 91 Antivirus detection for dropped file 2->91 93 28 other signatures 2->93 11 C082990403156E860FC5397A9D28D44325BCB24D24A97.exe 10 2->11         started        14 svchost.exe 1 2->14         started        16 svchost.exe 1 2->16         started        signatures3 process4 file5 65 C:\Users\user\AppData\...\setup_installer.exe, PE32 11->65 dropped 18 setup_installer.exe 29 11->18         started        process6 file7 49 C:\Users\user\AppData\...\setup_install.exe, PE32 18->49 dropped 51 C:\Users\user\...\Sun03ee83c3e08410d1.exe, PE32 18->51 dropped 53 C:\Users\user\AppData\...\Sun03cc7c9cea33.exe, PE32 18->53 dropped 55 24 other files (18 malicious) 18->55 dropped 21 setup_install.exe 1 18->21         started        process8 signatures9 115 Adds a directory exclusion to Windows Defender 21->115 117 Disables Windows Defender (via service or powershell) 21->117 24 cmd.exe 1 21->24         started        26 cmd.exe 1 21->26         started        28 cmd.exe 1 21->28         started        30 4 other processes 21->30 process10 signatures11 33 Sun030582477e.exe 24->33         started        38 Sun0336ad8e447ebe.exe 26->38         started        40 Sun0311f5acac.exe 28->40         started        119 Adds a directory exclusion to Windows Defender 30->119 121 Disables Windows Defender (via service or powershell) 30->121 42 powershell.exe 25 30->42         started        44 powershell.exe 30->44         started        process12 dnsIp13 67 62.204.41.46, 49800, 49827, 80 TNNET-ASTNNetOyMainnetworkFI United Kingdom 33->67 69 212.193.30.21, 49744, 49752, 49773 SPD-NETTR Russian Federation 33->69 75 6 other IPs or domains 33->75 57 C:\Users\user\AppData\Local\...\a[1].exe, PE32 33->57 dropped 59 C:\Users\user\AppData\...\ferrari[1].exe, PE32 33->59 dropped 61 C:\Users\...\xGQMHuCvAHAFTSnscrgTbZAW.exe, PE32 33->61 dropped 63 15 other files (1 malicious) 33->63 dropped 95 Antivirus detection for dropped file 33->95 97 Multi AV Scanner detection for dropped file 33->97 99 May check the online IP address of the machine 33->99 111 4 other signatures 33->111 71 91.219.236.27, 80 SERVERASTRA-ASHU Hungary 38->71 73 185.225.19.238, 49879, 49885, 49892 MIVOCLOUDMD Romania 38->73 77 2 other IPs or domains 38->77 101 Query firmware table information (likely to detect VMs) 38->101 103 Tries to detect sandboxes and other dynamic analysis tools (window names) 38->103 105 Machine Learning detection for dropped file 38->105 113 3 other signatures 38->113 107 Injects a PE file into a foreign processes 40->107 109 Found evasive API chain (trying to detect sleep duration tampering with parallel thread) 40->109 46 Sun0311f5acac.exe 40->46         started        file14 signatures15 process16 dnsIp17 85 ad-postback.biz 46->85
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2021-12-12 15:21:05 UTC
File Type:
PE (Exe)
Extracted files:
407
AV detection:
28 of 43 (65.12%)
Threat level:
  5/5
Result
Malware family:
socelars
Score:
  10/10
Tags:
family:onlylogger family:raccoon family:redline family:socelars botnet:03.12_build_3 botnet:4da27d123a577c68e42716053343dd3f8da508a2 botnet:@tui botnet:efc20640b4b1564934471e6297b87d8657db774a botnet:v1user1 aspackv2 discovery evasion infostealer loader persistence spyware stealer suricata trojan
Behaviour
Checks SCSI registry key(s)
Kills process with taskkill
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Looks up geolocation information via web service
Checks BIOS information in registry
Loads dropped DLL
Reads user/profile data of web browsers
ASPack v2.12-2.42
Executes dropped EXE
Identifies VirtualBox via ACPI registry values (likely anti-VM)
NirSoft WebBrowserPassView
Nirsoft
OnlyLogger Payload
OnlyLogger
Process spawned unexpected child process
Raccoon
RedLine
RedLine Payload
Socelars
Socelars Payload
Suspicious use of NtCreateProcessExOtherParentProcess
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin
Malware Config
C2 Extraction:
http://www.yarchworkshop.com/
159.69.246.184:13127
185.215.113.44:23759
45.9.20.221:15590
Unpacked files
SH256 hash:
1908cac443610b332e8adfc72481d2a225b72e679ff468d1643782e9c2d96e7c
MD5 hash:
60d12965e7dd763580b316f0743731c6
SHA1 hash:
54b2f29a834a6f9e931a19e3f53c27a132e19c19
SH256 hash:
a7e37f5314834b163fa21557e61c13c0f202fd64d3c0e46e6c90d2d02e033aec
MD5 hash:
6faec01bf7a3d7f5c5dee2e6e3143a58
SHA1 hash:
603a36f817cab5574e58ab279379e5c112e5fb37
SH256 hash:
3d966268571cf0a83f327df99ffd7441ffe65ad098f1db2fff8dd6a5d5233796
MD5 hash:
541501763132091ca1571883622b2c81
SHA1 hash:
17f0073da00f8511abc7b4dd5d018f043c0c5489
SH256 hash:
23491f7cfd3e4188496e25651a6e7747549fa02193ed7e28fc5f62df06c1bb46
MD5 hash:
afc39c521ec6a8e19d9138aac3261a81
SHA1 hash:
b774fca05e021f6e21c270a41f5c750023cae001
SH256 hash:
3bb55b0de90de0cc651dba71c869675c4fb5cfd1b9b21bd4957f1680f7506f06
MD5 hash:
f9d056f1d085e83a64c8ef2ba5f3be52
SHA1 hash:
bf04d73f991d0e45d459a5341593524e4e498801
SH256 hash:
b19104b568ca3ddccc2a8d3d10ecddb1ea240171e798dc3a486292cfa14b6365
MD5 hash:
7b0900da932f4ed9630d65b04422736d
SHA1 hash:
6fa340436e3a8e73ae2b3e911f861483183c68ef
SH256 hash:
fdfcbc8cfb57a3451a3d148e50794772d477ed6cc434acc779f1f0dd63e93f4b
MD5 hash:
a6865d7dffcc927d975be63b76147e20
SHA1 hash:
28e7edab84163cc2d0c864820bef89bae6f56bf8
SH256 hash:
6851e02d3f4b8179b975f00bbc86602a2f2f84524f548876eb656db7ea5eaa9c
MD5 hash:
c5124caf4aea3a83b63a9108fe0dcef8
SHA1 hash:
a43a5a59038fca5a63fa526277f241f855177ce6
SH256 hash:
e0dda7f6c3eaaa1dcd43a55c9a9d177dae7e9fc0aab5b0020f8028537b0f0775
MD5 hash:
17e3d3d471d65cf6659cf1d1dd8e0d87
SHA1 hash:
36c3d1f1bce246b8ed12844ec1407a7321f2d827
SH256 hash:
106f4984d17670c64b1f5b7b1da55dee5f62493b60e3952cc4813723a4b516d9
MD5 hash:
226c8d81b7e8880c2e40967540352641
SHA1 hash:
04aded92bb9f934a3b18a19d003fee75ec7c4a5e
SH256 hash:
93d9ce6291eb10f727da27c487816b29fcba1b907d252f94d11ea0c3a99175fa
MD5 hash:
c7fc3bcb573b112eca27af5ef7192cce
SHA1 hash:
e43a907bdaced88d3c4444844e72d2381e9f1ad7
SH256 hash:
4e3c72337ad6ede0f71934734ba639a39949c003d7943cb946ea4173b23fd0b7
MD5 hash:
88c2669e0bd058696300a9e233961b93
SHA1 hash:
fdbdc7399faa62ef2d811053a5053cd5d543a24b
SH256 hash:
4839e17ad35274e80b3719c3c0f404c1c378cc5f883730e49cd7f1beead2de26
MD5 hash:
3f2e97c6fdae0bbfb97dc283dd93b02d
SHA1 hash:
f7b5edf20f9a7b340a548508164abac93c464545
SH256 hash:
2a8d4016d47cd9824c025214fd5880384150dc64ad2a440c7cde620c131112ff
MD5 hash:
e333e3b0a2eabad2a5422bf80740fd19
SHA1 hash:
d20bf0b4f59b19cca12b7ea541dc3a581052944d
SH256 hash:
ee2cc85a8e1972a29ce67ab0218d5daa8fc9b67f36111c71eccaf6da05219d19
MD5 hash:
f6271f82a952f96ba9271a4a27c9f22f
SHA1 hash:
d12708b9e39a0cd06add96316b65f1668d6a1246
SH256 hash:
caf25adb1299b820e6e575e4cca3d3598eb3c1e5e94d51cfe19824c200bd9d40
MD5 hash:
8823baf6006b07947fc24c0b6b9f8521
SHA1 hash:
cf0f80a573576f6da7a3f824666a6702a0f45628
SH256 hash:
46ce741a6a760fb842c60f1a1394acf0266c55682c8d68f2e8cbb4f940e71879
MD5 hash:
116447f0128ba85700e0d3ae0d89de9c
SHA1 hash:
bd4eed101d39e68a351a3fa6fc1c6b3884df1873
SH256 hash:
d07bbf883bd7d3f91cf05983fcde9f204b56075d2d9bfab1eba3681d91356c86
MD5 hash:
650926d93664a15a577f096183d15891
SHA1 hash:
adc1d2c35b0f14554d67a65a2fd0296d7639e51d
SH256 hash:
8d00e826830e6c20d972c8a60ab708c931486777f914f04b4ced0a93ff46682f
MD5 hash:
2dad262708c3adf57e3367e74f4ea742
SHA1 hash:
9d97bef0546ea70a22fcd341b69734b1ea503900
SH256 hash:
00947fc525a45247fb9078cebab4a747af6f3c86fccce589885141ee8e68a20b
MD5 hash:
fe33f468f1ba592ab38079092763983c
SHA1 hash:
917eb75ac017cddad39ce78981b77041559b18ce
SH256 hash:
9290cbe0908d9c21a92f671c38844df647a48c9114e634f678b7d339258b2062
MD5 hash:
2419813e0f693d3958313419b3a0aff5
SHA1 hash:
79911de26d3178f5f09306b12d149704e8292358
SH256 hash:
5527ec711235621650d4ad98203e110e30ea1a01e03fa6563082ca681850121a
MD5 hash:
510abdfa69640def790dfaeb4055507e
SHA1 hash:
6d07ee6bcf51f8db725e834a61a3d39a2dcb1983
SH256 hash:
2f994717eb1236dc20ed55af5509d92eefd750bb24b67857c2da147917459665
MD5 hash:
ca636b05d114a64843e847e53ade1775
SHA1 hash:
42e8434fb7d7ad3d22026b8d39502fe07b3e4730
SH256 hash:
53a13d9b85c62c225f80677e7e84f0e4b3980c0695a7606212176326f2ee72e0
MD5 hash:
ba4548a88c431f3b9e3777e165a62f60
SHA1 hash:
412ca7d19a5bbc44fe0382a59f1bbae0eb1be44d
SH256 hash:
3e627ea5a0a3ed72c6f60b3a9c3ee0a2264cc22178ea20aba1cedb43919a60e3
MD5 hash:
ebfee6765c7e448e3ea21b40550d1a70
SHA1 hash:
08464d94727b3a9f523b93ddbaf21191c65214e5
SH256 hash:
da37723dbc887717a85940cdc3bda4a630d31e94a7af355558452a7c8d8ca5de
MD5 hash:
18f6ecc14ec6cbf833e7ab3dd31b5b36
SHA1 hash:
c2da6b4b158331a7f7bb9fa47f111e6fec7b8ecb
SH256 hash:
63525b0c1ef894632109c3169876b9e2ce728e38ed7f7c574021d5261d56e502
MD5 hash:
ff9b14f4f607a81117cc58916332262e
SHA1 hash:
aed4fe230075f2a067e4ac61fac117aaeb5ef6f9
SH256 hash:
cf1ed8957d4825743d39f19529138de7131ca8f506440ddc1774f4640dffc599
MD5 hash:
ded1c6e8c89148495fc19734e47b664d
SHA1 hash:
3a444aeacd154f8d66bca8a98615765c25eb3d41
SH256 hash:
df183c93796edcd0b720ee023a3d576d376dfcad5fa7688ff26442d86f45c6f7
MD5 hash:
ca0dfbb549b1b9da30bafefb4ef75342
SHA1 hash:
2d3edcc7cefe9eac936e2225f8aa7a24211cd385
SH256 hash:
880bfdf1f0451afb168b352997ec8d927674de671099859f9fb0b9b61e476009
MD5 hash:
d91201207f6d62302c21f3f2ca88b5ef
SHA1 hash:
050f431d4e925c75490f13734966b33c04d85a0f
SH256 hash:
af61ba29dd0d631cdae6b0c23018b065e341692bc27eaf553abefb387c0f0eaa
MD5 hash:
f4b8445151a01c2431424252583018c7
SHA1 hash:
e54e04381a6208a450762be9febe383945726288
SH256 hash:
8cdca3d4cea36c96505e89cf0a3fb3136132db5d397346d72e12d7ed6657245b
MD5 hash:
0737f673bb7fc8b68b24c753bf943fc2
SHA1 hash:
1d76456ce724c454b89a5acf8021ad1581ab8200
SH256 hash:
3c8414caab0019b8f3f8da24f77bc1ac827891d2e7f9c3e31bcfdc443af09e80
MD5 hash:
7a1d9a30b27d8ff87bab4157014daf72
SHA1 hash:
a60c3388eb0e6b7892d1487f74356afbdb6d6baa
SH256 hash:
17eba5a8fc60b5e62fbbea29e971691988da98a98db3a2c2bf9aad00b1b72dc4
MD5 hash:
e74d9b73743dfbb9f025a7908c85da37
SHA1 hash:
8a5b323b090cb0d2c4ff59f0ef520d323dd86097
SH256 hash:
3c178034f9cf6201e1e355fbaee8d32f0e2d3cc4ffa9c6279d3d23eb4bb2334c
MD5 hash:
ae4b01acfac3969487cc22d7f3885d9a
SHA1 hash:
93c63968423519c1c2de3f1bb771dfc921ceb333
SH256 hash:
ab3388019659dd8ebed42b5958d927ce5e212134ed7461292aa96a900f7f4d2e
MD5 hash:
675d620a2fddd54685ddbf2241dd7efe
SHA1 hash:
9ebda2cccecd2f085c383324cf24f1a348a03714
SH256 hash:
98066dd54e74ecc4aa6e740705cf84497ffb01215e9313b281ec64565e955e3e
MD5 hash:
8c94c1c0389fc63eda59f99609bcc0e7
SHA1 hash:
251e61853ff8fe1f24b36daabf9176f18bb0e36b
SH256 hash:
c082990403156e860fc5397a9d28d44325bcb24d24a97ad048f1d311a5109451
MD5 hash:
8dbea443ed6b1c5c65b8d2b5b2fee229
SHA1 hash:
c28671d261a7307d1e67e41a76e26c665ebb83eb
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:grakate_stealer_nov_2021
Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:MALWARE_Win_DLInjector06
Author:ditekSHen
Description:Detects downloader / injector
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:MALWARE_Win_Vidar
Author:ditekSHen
Description:Detects Vidar / ArkeiStealer
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Vidar
Author:kevoreilly
Description:Vidar Payload

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments