MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c24e160a7ac7effdff8fce20a39fe043de0a57b5d5514ec2ea59fd1809822906. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GCleaner


Vendor detections: 13


Intelligence 13 IOCs YARA 3 File information Comments

SHA256 hash: c24e160a7ac7effdff8fce20a39fe043de0a57b5d5514ec2ea59fd1809822906
SHA3-384 hash: db3ff16a41af2d748097dde54b33484e51ad5f1cf993a635f4c5688c51e7b338c65fdfee8315eec7890a555f47e87ca7
SHA1 hash: 3eef8f3fd3186c60c50347c773a501ee0324161a
MD5 hash: e05502a1e3564e1eb7d2825656a37da3
humanhash: enemy-alabama-emma-west
File name:file
Download: download sample
Signature GCleaner
File size:2'004'110 bytes
First seen:2023-03-26 00:33:50 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 884310b1928934402ea6fec1dbd3cf5e (3'725 x GCleaner, 3'514 x Socks5Systemz, 262 x RaccoonStealer)
ssdeep 49152:EGlJfsLiq6c024bnUjrG273Kr2NY5mq5ZpD5dlLYp:5HO0dDHYKq/q5ZpNPYp
Threatray 1'948 similar samples on MalwareBazaar
TLSH T13C953357B3484CF9E11294F10E86DD08F2EB7F650E7CE6B8619C568E8F51681CB4E326
TrID 50.3% (.EXE) Win32 Executable PowerBASIC/Win 9.x (148303/79/28)
37.2% (.EXE) Inno Setup installer (109740/4/30)
4.8% (.EXE) Win32 Executable Delphi generic (14182/79/4)
2.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
1.5% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon b298acbab2ca7a72 (2'327 x GCleaner, 1'631 x Socks5Systemz, 67 x RedLineStealer)
Reporter andretavare5
Tags:exe gcleaner


Avatar
andretavare5
Sample downloaded from http://45.12.253.74/pineapple.php?pub=mixinte

Intelligence


File Origin
# of uploads :
1
# of downloads :
328
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
file
Verdict:
Malicious activity
Analysis date:
2023-03-26 00:39:27 UTC
Tags:
installer gcleaner

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a window
Creating a process from a recently created file
Сreating synchronization primitives
Searching for the window
Creating a file in the Program Files subdirectories
Moving a file to the Program Files subdirectory
Modifying a system file
Sending a custom TCP request
Creating a file in the %AppData% subdirectories
Sending an HTTP GET request
Running batch commands
Creating a process with a hidden window
Using the Windows Management Instrumentation requests
Launching a tool to kill processes
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckCmdLine
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware installer overlay packed packed shell32.dll
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
MinerDownloader, Nymaim, RedLine, Xmrig
Detection:
malicious
Classification:
troj.spyw.evad.mine
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Connects to a pastebin service (likely for C&C)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Encrypted powershell cmdline option found
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample is not signed and drops a device driver
Sample uses process hollowing technique
Snort IDS alert for network traffic
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
Yara detected Generic MinerDownloader
Yara detected Nymaim
Yara detected RedLine Stealer
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 834892 Sample: file.exe Startdate: 26/03/2023 Architecture: WINDOWS Score: 100 91 45.12.253.98 CMCSUS Germany 2->91 93 raw.githubusercontent.com 2->93 123 Snort IDS alert for network traffic 2->123 125 Multi AV Scanner detection for domain / URL 2->125 127 Malicious sample detected (through community Yara rule) 2->127 129 14 other signatures 2->129 14 file.exe 2 2->14         started        signatures3 process4 file5 89 C:\Users\user\AppData\Local\...\is-LRQSP.tmp, PE32 14->89 dropped 17 is-LRQSP.tmp 11 24 14->17         started        process6 file7 69 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 17->69 dropped 71 C:\Users\user\AppData\Local\...\_iscrypt.dll, PE32 17->71 dropped 73 C:\...\unins000.exe (copy), PE32 17->73 dropped 75 6 other files (4 malicious) 17->75 dropped 20 FRec325.exe 27 17->20         started        process8 dnsIp9 99 45.12.253.56, 49698, 80 CMCSUS Germany 20->99 101 45.12.253.72, 49699, 80 CMCSUS Germany 20->101 103 45.12.253.75, 49703, 80 CMCSUS Germany 20->103 77 C:\Users\user\AppData\...\5shkFD3Le.exe, PE32 20->77 dropped 79 C:\Users\user\AppData\...\3VPwMlspA0.exe, PE32 20->79 dropped 81 C:\Users\user\AppData\Local\...\D4[1].file, PE32 20->81 dropped 24 3VPwMlspA0.exe 10 20->24         started        28 cmd.exe 20->28         started        30 5shkFD3Le.exe 20->30         started        file10 process11 file12 83 C:\Users\user\AppData\Local\Temp\...\m1.exe, PE32 24->83 dropped 85 C:\Users\user\AppData\Local\Temp\...\f1.exe, PE32 24->85 dropped 131 Multi AV Scanner detection for dropped file 24->131 133 Machine Learning detection for dropped file 24->133 32 m1.exe 24->32         started        35 f1.exe 24->35         started        135 Encrypted powershell cmdline option found 28->135 37 conhost.exe 28->37         started        39 taskkill.exe 28->39         started        signatures13 process14 signatures15 111 Multi AV Scanner detection for dropped file 32->111 113 Machine Learning detection for dropped file 32->113 115 Writes to foreign memory regions 32->115 117 Sample uses process hollowing technique 32->117 41 RegSvcs.exe 32->41         started        44 RegSvcs.exe 32->44         started        46 RegSvcs.exe 32->46         started        48 WerFault.exe 32->48         started        119 Allocates memory in foreign processes 35->119 121 Injects a PE file into a foreign processes 35->121 50 RegSvcs.exe 15 4 35->50         started        53 WerFault.exe 24 9 35->53         started        process16 dnsIp17 137 Writes to foreign memory regions 41->137 139 Injects a PE file into a foreign processes 41->139 55 AppLaunch.exe 41->55         started        60 conhost.exe 41->60         started        95 91.193.43.63, 49708, 81 ITFPL Belgium 50->95 97 api.ip.sb 50->97 141 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 50->141 143 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 50->143 145 Tries to steal Crypto Currency Wallets 50->145 signatures18 process19 dnsIp20 105 pastebin.com 104.20.67.143, 443, 49716 CLOUDFLARENETUS United States 55->105 107 192.168.2.1 unknown unknown 55->107 109 github.com 55->109 87 C:\ProgramData\HostData\logs.uce, ASCII 55->87 dropped 147 Sample is not signed and drops a device driver 55->147 62 cmd.exe 55->62         started        file21 signatures22 process23 signatures24 149 Encrypted powershell cmdline option found 62->149 65 conhost.exe 62->65         started        67 powershell.exe 62->67         started        process25
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2023-03-26 00:34:09 UTC
File Type:
PE (Exe)
Extracted files:
4
AV detection:
16 of 24 (66.67%)
Threat level:
  5/5
Result
Malware family:
gcleaner
Score:
  10/10
Tags:
family:gcleaner discovery loader
Behaviour
Kills process with taskkill
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Checks installed software on the system
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
GCleaner
Malware Config
C2 Extraction:
45.12.253.56
45.12.253.72
45.12.253.98
45.12.253.75
Unpacked files
SH256 hash:
3142616692cf0bfa7d26e7cf5bb70e6d1bffc9efd26135d79167d04cd95b9cc1
MD5 hash:
5a85a19d0a936ee90d7e288d775e3d98
SHA1 hash:
cb94b0e838c44431e2676db88634ac8219e98a23
Detections:
Nymaim win_nymaim_g0 win_gcleaner_auto
SH256 hash:
80e6d447c5d7b37abb90ef30f8c923ac3b00e32c1ccb3c985e1a29ed37a8c534
MD5 hash:
752149283c81e6f2758910ac1320c485
SHA1 hash:
e12aa46f1dad7caa101d241ffaeb3e9c9a919868
SH256 hash:
fd61bbb9410cd1db0ff509364d5d9c6edb9b803193a1b2bab733e3d16942667b
MD5 hash:
6685353823fbeb44c770918faa97b331
SHA1 hash:
dc3ab0496f3f4c654358124d70ef81b36a4f23d4
SH256 hash:
c24e160a7ac7effdff8fce20a39fe043de0a57b5d5514ec2ea59fd1809822906
MD5 hash:
e05502a1e3564e1eb7d2825656a37da3
SHA1 hash:
3eef8f3fd3186c60c50347c773a501ee0324161a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
Rule name:win_gcleaner_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.gcleaner.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Dropped by
PrivateLoader
  
Delivery method
Distributed via drive-by

Comments