MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fb9debaa8cfc0e3851bc7af4227915e79187e051ae9941ed8ae658b3fb1ac7ec. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GCleaner


Vendor detections: 9


Intelligence 9 IOCs YARA 3 File information Comments

SHA256 hash: fb9debaa8cfc0e3851bc7af4227915e79187e051ae9941ed8ae658b3fb1ac7ec
SHA3-384 hash: 1577e4446e9a87fab2d2e563e9283528aaf6c263d50d0ac00ecad3fcd310fc0dd8265f9d88d9c632d7b5f24b9affa13f
SHA1 hash: 4de964e82e254654c30e261a5c351c6dfdcc105d
MD5 hash: 6ca815c68630f407da482e497f037a96
humanhash: idaho-skylark-eighteen-fourteen
File name:file
Download: download sample
Signature GCleaner
File size:1'760'812 bytes
First seen:2023-07-21 00:55:46 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 884310b1928934402ea6fec1dbd3cf5e (3'725 x GCleaner, 3'446 x Socks5Systemz, 262 x RaccoonStealer)
ssdeep 49152:b2YLzyu58ITbNyBeeK9JXjHO7rcIIjotB6:ykjfNqeTmvIjotB6
Threatray 93 similar samples on MalwareBazaar
TLSH T12685331296B1A071E069DD382F2F8300C7637EEC593165ADB29E9DCD3F32A46139536B
TrID 46.3% (.EXE) Win32 Executable PowerBASIC/Win 9.x (148303/79/28)
34.2% (.EXE) Inno Setup installer (109740/4/30)
13.4% (.EXE) InstallShield setup (43053/19/16)
2.0% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
1.4% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon b298acbab2ca7a72 (2'327 x GCleaner, 1'631 x Socks5Systemz, 67 x RedLineStealer)
Reporter andretavare5
Tags:exe gcleaner


Avatar
andretavare5
Sample downloaded from http://45.12.253.74/pineapple.php?pub=mixinte

Intelligence


File Origin
# of uploads :
1
# of downloads :
307
Origin country :
US US
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
file
Verdict:
Suspicious activity
Analysis date:
2023-07-21 00:57:09 UTC
Tags:
installer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Gathering data
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Machine Learning detection for dropped file
Multi AV Scanner detection for dropped file
Snort IDS alert for network traffic
Yara detected Nymaim
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1277130 Sample: file.exe Startdate: 21/07/2023 Architecture: WINDOWS Score: 100 53 45.12.253.98 CMCSUS Germany 2->53 55 Snort IDS alert for network traffic 2->55 57 Found malware configuration 2->57 59 Antivirus detection for URL or domain 2->59 61 6 other signatures 2->61 10 file.exe 2 2->10         started        signatures3 process4 file5 37 C:\Users\user\AppData\Local\...\file.exe.tmp, PE32 10->37 dropped 13 file.exe.tmp 11 102 10->13         started        process6 file7 39 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 13->39 dropped 41 C:\Users\user\AppData\Local\...\_iscrypt.dll, PE32 13->41 dropped 43 C:\...\unins000.exe (copy), PE32 13->43 dropped 45 8 other files (6 malicious) 13->45 dropped 16 FCSpacer720.exe 22 13->16         started        20 net.exe 1 13->20         started        process8 dnsIp9 47 45.12.253.56, 49697, 80 CMCSUS Germany 16->47 49 45.12.253.72, 49698, 80 CMCSUS Germany 16->49 51 45.12.253.75, 49699, 80 CMCSUS Germany 16->51 35 C:\Users\user\AppData\...\mwsMm15dlpDqe.exe, PE32 16->35 dropped 22 mwsMm15dlpDqe.exe 16->22         started        25 cmd.exe 1 16->25         started        27 conhost.exe 20->27         started        29 net1.exe 1 20->29         started        file10 process11 signatures12 63 Multi AV Scanner detection for dropped file 22->63 31 taskkill.exe 1 25->31         started        33 conhost.exe 25->33         started        process13
Threat name:
Win32.Trojan.Privateloader
Status:
Suspicious
First seen:
2023-07-21 00:56:06 UTC
File Type:
PE (Exe)
Extracted files:
5
AV detection:
12 of 25 (48.00%)
Threat level:
  5/5
Result
Malware family:
gcleaner
Score:
  10/10
Tags:
family:gcleaner discovery loader
Behaviour
Kills process with taskkill
Runs net.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Checks installed software on the system
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
GCleaner
Malware Config
C2 Extraction:
45.12.253.56
45.12.253.72
45.12.253.98
45.12.253.75
Unpacked files
SH256 hash:
1eace125e80234a6169bfeccc012e14758ad4dade05da9bb7443b07239916edf
MD5 hash:
b7546aa3c1e5ba984cabce9f89390854
SHA1 hash:
cb495cdcf793588303045a6edcd0a2e5afe02492
SH256 hash:
801e08188e8ae0fa838f4f8e89c2a893423f29673f2d29b876cd1b811b5a7099
MD5 hash:
9df6b863a7333cd86050cf49c6109724
SHA1 hash:
c87268545b2352dbf0055f15f80c6e501aa2656d
SH256 hash:
444c9128114c59e174dec3a243760f73843021b91cfab7959d71ee03b569c63c
MD5 hash:
c3f876aa5806a3e6815dc841a792f5bd
SHA1 hash:
83e3fdff1e387991c69d69d4cc6f53182d52131b
SH256 hash:
fb9debaa8cfc0e3851bc7af4227915e79187e051ae9941ed8ae658b3fb1ac7ec
MD5 hash:
6ca815c68630f407da482e497f037a96
SHA1 hash:
4de964e82e254654c30e261a5c351c6dfdcc105d
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
Rule name:win_gcleaner_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.gcleaner.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Dropped by
PrivateLoader
  
Delivery method
Distributed via drive-by

Comments