MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d641aef734578f5f4f79323d1a00dc23a9a5f12dc085ed433784f41ffec1ad7a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GCleaner


Vendor detections: 14


Intelligence 14 IOCs YARA 6 File information Comments

SHA256 hash: d641aef734578f5f4f79323d1a00dc23a9a5f12dc085ed433784f41ffec1ad7a
SHA3-384 hash: b30421c582504b932e4cc4e0854e6ae9c4021b2aafcf7cb8960ce79528392e8d476fbb6e62e360cf82c5687061336c6f
SHA1 hash: 4980046dae3fc819059347fae041e3d547361d14
MD5 hash: 30cca9b4caac612351124a0b3a39e0cb
humanhash: louisiana-tennis-eight-pizza
File name:file
Download: download sample
Signature GCleaner
File size:4'298'512 bytes
First seen:2025-10-30 20:28:39 UTC
Last seen:2025-10-30 21:19:17 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 7a337ff2ab8420c93b38276d6869db84 (3 x GCleaner)
ssdeep 98304:xWJ0lbASGK4CEHje2V+raWCdHVpIZt8R66:RsSG9DDe2Y+jdHain
TLSH T18616DF1DE6D42F33CCF2F6700D6AC5C4652B6940D53CA0486F95823B662B6B17B29F2E
TrID 52.9% (.EXE) Win32 Executable Delphi generic (14182/79/4)
16.8% (.EXE) Win32 Executable (generic) (4504/4/1)
7.7% (.EXE) Win16/32 Executable Delphi generic (2072/23)
7.5% (.EXE) OS/2 Executable (generic) (2029/13)
7.4% (.EXE) Generic Win/DOS Executable (2002/3)
Magika pebin
Reporter Bitsight
Tags:dropped-by-amadey exe gcleaner


Avatar
Bitsight
url: http://178.16.55.189/files/unique2/random.exe

Intelligence


File Origin
# of uploads :
4
# of downloads :
102
Origin country :
US US
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
file
Verdict:
Malicious activity
Analysis date:
2025-10-30 20:28:54 UTC
Tags:
delphi auto generic gcleaner loader rhadamanthys stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
delphi cobalt emotet
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a window
Searching for synchronization primitives
Creating a file in the %temp% directory
Creating a process from a recently created file
DNS request
Connection attempt
Sending a custom TCP request
Sending an HTTP GET request
Unauthorized injection to a recently created process by context flags manipulation
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
adaptive-context anti-debug borland_delphi expired-cert fingerprint installer-heuristic invalid-signature keylogger packed signed
Verdict:
Malicious
File Type:
exe x32
First seen:
2025-10-30T17:44:00Z UTC
Last seen:
2025-11-01T04:49:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan.Win32.Agent.gen
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PE (Portable Executable) PE File Layout Win 32 Exe x86
Threat name:
Win32.Backdoor.Androm
Status:
Malicious
First seen:
2025-10-30 20:31:46 UTC
File Type:
PE (Exe)
Extracted files:
34
AV detection:
29 of 38 (76.32%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
discovery
Behaviour
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Executes dropped EXE
Downloads MZ/PE file
Unpacked files
SH256 hash:
d641aef734578f5f4f79323d1a00dc23a9a5f12dc085ed433784f41ffec1ad7a
MD5 hash:
30cca9b4caac612351124a0b3a39e0cb
SHA1 hash:
4980046dae3fc819059347fae041e3d547361d14
SH256 hash:
d3d3224b50e7ff955cba76e05f5058471add627c6f15658420146040192b3e1b
MD5 hash:
61f30fea94c55ee3199526448a73e58f
SHA1 hash:
71c175173df87bda7ffc77b2208b28f04bbdc628
SH256 hash:
35c397a81d9071ad179d0853930598bb128cd9b127fdde3586dcb1bd0b25e0ab
MD5 hash:
dc39c54d7cdaaed6cff18d1e633196b3
SHA1 hash:
d0d11d99d716120cad6cde7203a65c11943e9ef8
Detections:
GCleaner
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BobSoftMiniDelphiBoBBobSoft
Author:malware-lu
Rule name:Borland
Author:malware-lu
Rule name:HUNTING_SUSP_TLS_SECTION
Author:chaosphere
Description:Detect PE files with .tls section that can be used for anti-debugging
Reference:Practical Malware Analysis - Chapter 16
Rule name:pe_detect_tls_callbacks
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

GCleaner

Executable exe d641aef734578f5f4f79323d1a00dc23a9a5f12dc085ed433784f41ffec1ad7a

(this sample)

  
Dropped by
Amadey
  
Delivery method
Distributed via web download

Comments