MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ca8ca777ecf1e8017e347ca3463f7b6bcb17eca9ab2ac7d114604b9042377822. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GCleaner


Vendor detections: 12


Intelligence 12 IOCs YARA 3 File information Comments

SHA256 hash: ca8ca777ecf1e8017e347ca3463f7b6bcb17eca9ab2ac7d114604b9042377822
SHA3-384 hash: f6c25ebd52ea4770ba09247558906827ff5771b6fed48edf6a6db5f30a3296445542e63b0f84ab0e170eaf1b4644321b
SHA1 hash: fc662877741dd8c7e4a000b97abb67fb40c656ec
MD5 hash: b20de4f64d40c6338586b4b0331eb1e2
humanhash: illinois-yankee-autumn-magnesium
File name:file
Download: download sample
Signature GCleaner
File size:1'254'509 bytes
First seen:2023-07-23 11:03:02 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 884310b1928934402ea6fec1dbd3cf5e (3'725 x GCleaner, 3'445 x Socks5Systemz, 262 x RaccoonStealer)
ssdeep 24576:S2lWLzyM0IKMRE+TOQ9lO8jcZLBHYVQw4RGybD0eSDv7+ubvEM6:S2YLzyTATOQ9JOLB4v7iAND/B6
Threatray 96 similar samples on MalwareBazaar
TLSH T17D452366E6A4C4F7E0E28F38ACA5E404E3A77D762C70505535DCABBD1F93482858F3A4
TrID 50.8% (.EXE) Win32 Executable PowerBASIC/Win 9.x (148303/79/28)
37.6% (.EXE) Inno Setup installer (109740/4/30)
4.8% (.EXE) Win32 Executable Delphi generic (14182/79/4)
2.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
1.5% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon b298acbab2ca7a72 (2'327 x GCleaner, 1'631 x Socks5Systemz, 67 x RedLineStealer)
Reporter andretavare5
Tags:exe gcleaner


Avatar
andretavare5
Sample downloaded from http://45.12.253.74/pineapple.php?pub=mixinte

Intelligence


File Origin
# of uploads :
1
# of downloads :
327
Origin country :
US US
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
file
Verdict:
Malicious activity
Analysis date:
2023-07-23 11:07:32 UTC
Tags:
installer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a window
Creating a process from a recently created file
Сreating synchronization primitives
Searching for the window
Creating a file in the Program Files subdirectories
Moving a file to the Program Files subdirectory
Launching the process to interact with network services
Modifying a system file
Launching a process
Creating a file in the %AppData% subdirectories
Sending a custom TCP request
Running batch commands
Creating a process with a hidden window
Using the Windows Management Instrumentation requests
Creating a file in the Windows subdirectories
Launching a tool to kill processes
Sending an HTTP GET request to an infection source
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
control greyware installer lolbin overlay packed shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine, Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses known network protocols on non-standard ports
Writes to foreign memory regions
Yara detected RedLine Stealer
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1277869 Sample: file.exe Startdate: 23/07/2023 Architecture: WINDOWS Score: 100 100 Snort IDS alert for network traffic 2->100 102 Found malware configuration 2->102 104 Malicious sample detected (through community Yara rule) 2->104 106 10 other signatures 2->106 10 file.exe 2 2->10         started        13 rundll32.exe 2->13         started        process3 file4 76 C:\Users\user\AppData\Local\...\file.exe.tmp, PE32 10->76 dropped 15 file.exe.tmp 11 102 10->15         started        process5 file6 78 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 15->78 dropped 80 C:\Users\user\AppData\Local\...\_iscrypt.dll, PE32 15->80 dropped 82 C:\...\unins000.exe (copy), PE32 15->82 dropped 84 8 other files (6 malicious) 15->84 dropped 18 FFSpacer723.exe 33 15->18         started        22 net.exe 1 15->22         started        process7 dnsIp8 86 45.12.253.56, 49695, 80 CMCSUS Germany 18->86 88 45.12.253.72, 49696, 80 CMCSUS Germany 18->88 90 45.12.253.75, 49697, 49698, 49711 CMCSUS Germany 18->90 64 C:\Users\user\AppData\...\ujueXEesUasO7.exe, PE32 18->64 dropped 66 C:\Users\user\AppData\Roaming\...\dpGnye.exe, PE32 18->66 dropped 68 C:\Users\user\AppData\Roaming\...\dO6eZgQ.exe, PE32 18->68 dropped 70 6 other malicious files 18->70 dropped 24 QruFISpN3Q.exe 1 18->24         started        27 dO6eZgQ.exe 18->27         started        29 HRskxwFO.exe 18->29         started        36 3 other processes 18->36 32 conhost.exe 22->32         started        34 net1.exe 1 22->34         started        file9 process10 dnsIp11 108 Multi AV Scanner detection for dropped file 24->108 110 Contains functionality to inject code into remote processes 24->110 112 Writes to foreign memory regions 24->112 39 AppLaunch.exe 4 24->39         started        43 WerFault.exe 24 9 24->43         started        45 conhost.exe 24->45         started        114 Allocates memory in foreign processes 27->114 116 Injects a PE file into a foreign processes 27->116 47 AppLaunch.exe 27->47         started        49 conhost.exe 27->49         started        51 WerFault.exe 27->51         started        96 t.me 149.154.167.99, 443, 49699 TELEGRAMRU United Kingdom 29->96 98 168.119.51.197, 13370, 49700 HETZNER-ASDE Germany 29->98 118 Detected unpacking (changes PE section rights) 29->118 120 Detected unpacking (overwrites its own PE header) 29->120 122 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 29->122 124 2 other signatures 29->124 53 WerFault.exe 29->53         started        72 C:\Users\user\AppData\Local\...\guveyrkgw.dat, PE32+ 36->72 dropped 55 cmd.exe 36->55         started        58 2 other processes 36->58 file12 signatures13 process14 dnsIp15 92 176.123.9.142, 14845, 49710 ALEXHOSTMD Moldova Republic of 39->92 126 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 39->126 128 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 39->128 130 Tries to steal Crypto Currency Wallets 39->130 94 77.246.110.195 MEDIAL-ASRU Russian Federation 47->94 132 Tries to harvest and steal browser information (history, passwords, etc) 47->132 74 C:\Users\user\AppData\Local\...\ffpgoygm.exe, PE32 55->74 dropped 60 conhost.exe 55->60         started        62 ffpgoygm.exe 55->62         started        file16 signatures17 process18
Threat name:
Win32.Trojan.Privateloader
Status:
Malicious
First seen:
2023-07-23 11:04:05 UTC
File Type:
PE (Exe)
Extracted files:
5
AV detection:
14 of 23 (60.87%)
Threat level:
  5/5
Result
Malware family:
gcleaner
Score:
  10/10
Tags:
family:gcleaner discovery loader
Behaviour
Kills process with taskkill
Runs net.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Checks installed software on the system
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
GCleaner
Malware Config
C2 Extraction:
45.12.253.56
45.12.253.72
45.12.253.98
45.12.253.75
Unpacked files
SH256 hash:
7138d2842350624d75c1f12c8bd0f0e47c327085183791e744c2f5d02b12ca73
MD5 hash:
4cb4e2d1c24d72bdb8029add6e137f93
SHA1 hash:
23e3924fcaf8191dbb59685d8883adc4dd0561c8
SH256 hash:
20af66e1da517505149bbdc984faa7675ee1742db17d0b96db407127a0659451
MD5 hash:
deb9f1f3a72ac3cf96eb6b067e5f2b33
SHA1 hash:
5fcd2746085f5855de5db948219316c8ae230c88
SH256 hash:
c432fab5c1779fe9416552d16139582150d45fa0ee1231daff32b32fd98738a0
MD5 hash:
3a9332527fc25068c4911b3a9d9089e6
SHA1 hash:
07032abe6c75ef587d8be715f8da549cd7bec325
SH256 hash:
ca8ca777ecf1e8017e347ca3463f7b6bcb17eca9ab2ac7d114604b9042377822
MD5 hash:
b20de4f64d40c6338586b4b0331eb1e2
SHA1 hash:
fc662877741dd8c7e4a000b97abb67fb40c656ec
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
Rule name:win_gcleaner_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.gcleaner.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Dropped by
PrivateLoader
  
Delivery method
Distributed via drive-by

Comments