MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d111ec53f8b2b607690efdb923ef287b18bcc25c656e1b0c1ea327d1416899f3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GCleaner


Vendor detections: 13


Intelligence 13 IOCs YARA 3 File information Comments

SHA256 hash: d111ec53f8b2b607690efdb923ef287b18bcc25c656e1b0c1ea327d1416899f3
SHA3-384 hash: 1b9eededc43393ff3aea09375e4bc8c2cf1aa02a1e2902ec18578c071d1c9f23190a72f77e97e95af9632599fed1663c
SHA1 hash: ed6257749dd594ed0a535cf56bbe32dcc10ead07
MD5 hash: 44383d8b4fdd4732fb6ff0174433529a
humanhash: mars-romeo-chicken-arizona
File name:file
Download: download sample
Signature GCleaner
File size:2'278'911 bytes
First seen:2023-02-04 03:47:03 UTC
Last seen:2023-02-04 04:59:50 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 884310b1928934402ea6fec1dbd3cf5e (3'725 x GCleaner, 3'446 x Socks5Systemz, 262 x RaccoonStealer)
ssdeep 49152:A2ZPbwklvCECBcs6hSgaVhjvHufecegP4xxiLCgv2MR:Njwkl/CaxcJHufezbxEv2MR
TLSH T154B5DF065C98E467E0D58FB0D9E36EFB5C11ED78D0B41817D1083EFB3A32E522D4AA69
TrID 78.6% (.EXE) Inno Setup installer (109740/4/30)
10.1% (.EXE) Win32 Executable Delphi generic (14182/79/4)
3.2% (.EXE) Win32 Executable (generic) (4505/5/1)
2.1% (.MZP) WinArchiver Mountable compressed Archive (3000/1)
1.4% (.EXE) Win16/32 Executable Delphi generic (2072/23)
File icon (PE):PE icon
dhash icon 96968e8e0f0f9696 (49 x GCleaner, 1 x NetSupport)
Reporter andretavare5
Tags:exe gcleaner


Avatar
andretavare5
Sample downloaded from http://45.12.253.74/pineapple.php?pub=mixinte

Intelligence


File Origin
# of uploads :
37
# of downloads :
208
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
file
Verdict:
Malicious activity
Analysis date:
2023-02-04 03:49:34 UTC
Tags:
installer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %temp% subdirectories
Creating a window
Creating a process from a recently created file
Сreating synchronization primitives
Creating a file in the Program Files subdirectories
Moving a file to the Program Files subdirectory
Modifying a system file
Creating a file in the %AppData% subdirectories
Sending an HTTP GET request
Sending a custom TCP request
Running batch commands
Creating a process with a hidden window
Using the Windows Management Instrumentation requests
Creating a file in the Windows subdirectories
Launching a tool to kill processes
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckCmdLine
Verdict:
No Threat
Threat level:
  2/10
Confidence:
80%
Tags:
greyware overlay packed shell32.dll
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Cryptbot, RHADAMANTHYS, RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Checks if the current machine is a virtual machine (disk enumeration)
Creates an undocumented autostart registry key
Detected unpacking (changes PE section rights)
Encrypted powershell cmdline option found
Found C&C like URL pattern
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file contains section with special chars
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected Cryptbot
Yara detected CryptbotV2
Yara detected RedLine Stealer
Yara detected RHADAMANTHYS Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 798412 Sample: file.exe Startdate: 04/02/2023 Architecture: WINDOWS Score: 100 121 api.ip.sb 2->121 157 Snort IDS alert for network traffic 2->157 159 Malicious sample detected (through community Yara rule) 2->159 161 Antivirus detection for URL or domain 2->161 163 17 other signatures 2->163 15 file.exe 2 2->15         started        signatures3 process4 file5 119 C:\Users\user\AppData\Local\Temp\...\file.tmp, PE32 15->119 dropped 147 Obfuscated command line found 15->147 19 file.tmp 18 16 15->19         started        signatures6 process7 file8 89 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 19->89 dropped 91 C:\Users\user\AppData\Local\...\_iscrypt.dll, PE32 19->91 dropped 93 C:\Users\user\AppData\Local\...\_RegDLL.tmp, PE32 19->93 dropped 95 6 other files (5 malicious) 19->95 dropped 22 FRec24.exe 33 19->22         started        process9 dnsIp10 135 45.12.253.56, 49682, 80 CMCSUS Germany 22->135 137 45.12.253.72, 49683, 80 CMCSUS Germany 22->137 139 45.12.253.75, 49684, 49687, 49689 CMCSUS Germany 22->139 101 C:\Users\user\AppData\...\TwD5Cb6U.exe, PE32 22->101 dropped 103 C:\Users\user\AppData\...\yt6297UU.exe, PE32 22->103 dropped 105 C:\Users\user\AppData\Roaming\...\unKNd3R.exe, PE32 22->105 dropped 107 4 other malicious files 22->107 dropped 26 unKNd3R.exe 9 22->26         started        31 KtqgaOYZu.exe 22->31         started        33 TwD5Cb6U.exe 22->33         started        35 3 other processes 22->35 file11 process12 dnsIp13 143 izpr8v2mkew9mygsipxke.5cka9tl3wvorkqapexgbstfzs11lpvew 26->143 117 C:\Users\user\AppData\Local\...\6835875.dll, PE32 26->117 dropped 205 Multi AV Scanner detection for dropped file 26->205 207 Writes to foreign memory regions 26->207 209 Allocates memory in foreign processes 26->209 37 fontview.exe 26->37         started        42 ngentask.exe 4 26->42         started        211 Detected unpacking (changes PE section rights) 31->211 213 Injects a PE file into a foreign processes 31->213 44 KtqgaOYZu.exe 78 31->44         started        145 212.113.106.41 ASRELCOMSPBRU Russian Federation 35->145 46 conhost.exe 35->46         started        48 taskkill.exe 35->48         started        file14 signatures15 process16 dnsIp17 125 109.206.243.168, 49693, 49694, 80 AWMLTNL Germany 37->125 97 C:\Users\user\AppData\...\nsis_uns68fdaf.dll, PE32+ 37->97 dropped 165 Query firmware table information (likely to detect VMs) 37->165 167 Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines) 37->167 169 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 37->169 179 4 other signatures 37->179 50 rundll32.exe 37->50         started        127 45.15.156.202, 15601, 49691 RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU Russian Federation 42->127 171 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 42->171 173 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 42->173 175 Tries to harvest and steal browser information (history, passwords, etc) 42->175 177 Tries to steal Crypto Currency Wallets 42->177 129 whiagu52.top 84.21.172.161, 49690, 80 COMBAHTONcombahtonGmbHDE Germany 44->129 131 www.google.com 142.250.180.132, 443, 49688 GOOGLEUS United States 44->131 133 2 other IPs or domains 44->133 99 C:\Users\user\AppData\Roaming\...\graved.exe, PE32 44->99 dropped 53 cmd.exe 44->53         started        55 cmd.exe 44->55         started        file18 signatures19 process20 signatures21 149 System process connects to network (likely due to code injection or exploit) 50->149 151 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 50->151 153 Tries to steal Mail credentials (via file / registry access) 50->153 155 4 other signatures 50->155 57 dllhost.exe 50->57         started        62 WerFault.exe 50->62         started        64 graved.exe 53->64         started        66 conhost.exe 53->66         started        68 conhost.exe 55->68         started        70 timeout.exe 55->70         started        process22 dnsIp23 141 transfer.sh 144.76.136.153 HETZNER-ASDE Germany 57->141 111 C:\Users\user\AppData\Local\...\Library.exe, PE32+ 57->111 dropped 113 C:\Users\user\AppData\Local\Temp\Data.exe, PE32+ 57->113 dropped 195 System process connects to network (likely due to code injection or exploit) 57->195 72 Library.exe 57->72         started        76 Data.exe 57->76         started        115 C:\Users\user\AppData\...\DpEditor.exe, PE32 64->115 dropped 197 Multi AV Scanner detection for dropped file 64->197 199 Query firmware table information (likely to detect VMs) 64->199 201 Hides threads from debuggers 64->201 203 Tries to detect sandboxes / dynamic malware analysis system (registry check) 64->203 78 DpEditor.exe 64->78         started        file24 signatures25 process26 file27 109 C:\Users\user\AppData\...\ThreadStorage.exe, PE32+ 72->109 dropped 181 Creates an undocumented autostart registry key 72->181 183 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 72->183 185 Encrypted powershell cmdline option found 72->185 193 4 other signatures 72->193 80 powershell.exe 72->80         started        82 MSBuild.exe 72->82         started        85 powershell.exe 76->85         started        187 Query firmware table information (likely to detect VMs) 78->187 189 Hides threads from debuggers 78->189 191 Tries to detect sandboxes / dynamic malware analysis system (registry check) 78->191 signatures28 process29 dnsIp30 87 conhost.exe 80->87         started        123 45.159.189.105 HOSTING-SOLUTIONSUS Netherlands 82->123 process31
Threat name:
Win32.Trojan.Privateloader
Status:
Malicious
First seen:
2023-02-04 03:48:09 UTC
File Type:
PE (Exe)
Extracted files:
4
AV detection:
14 of 26 (53.85%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
gcleaner
Score:
  10/10
Tags:
family:gcleaner discovery loader
Behaviour
Kills process with taskkill
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Checks installed software on the system
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
GCleaner
Malware Config
C2 Extraction:
45.12.253.56
45.12.253.72
45.12.253.98
45.12.253.75
Unpacked files
SH256 hash:
5b2d2c22843c0a69e4acd059e43efeae8579e347a2d4097a2d60fec3c726a5a8
MD5 hash:
f0792130e0b7416ea44ae837e18a668f
SHA1 hash:
3986fe36882bfe57f7ba3ca74d0079568c72bbe6
Detections:
win_nymaim_g0 Nymaim win_gcleaner_auto
SH256 hash:
88de1ce2cd0a91b92a3668494a4816b3b32106e8e58b2f8b6982f0f634e26c90
MD5 hash:
bd4a2e18f749e9a8c4d316368667e57a
SHA1 hash:
f87fa90402fca72edac46b305fe9cc7d082d0f76
SH256 hash:
b5bf8ac1406d5c70772531561b618d9e679389d935f4dbf43e0164ab325813bb
MD5 hash:
828a09b69b78450f0e85642392b161bd
SHA1 hash:
38ee7676a05eae8fc5921e9ec7b753c966f3c0fb
SH256 hash:
d111ec53f8b2b607690efdb923ef287b18bcc25c656e1b0c1ea327d1416899f3
MD5 hash:
44383d8b4fdd4732fb6ff0174433529a
SHA1 hash:
ed6257749dd594ed0a535cf56bbe32dcc10ead07
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
Rule name:win_gcleaner_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.gcleaner.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Dropped by
PrivateLoader
  
Delivery method
Distributed via drive-by

Comments