MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fc2e04d392ab5e508fdf6c90ce456bfd0af6def1f10a2074f82df8f58079d5e4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GCleaner


Vendor detections: 13


Intelligence 13 IOCs 2 YARA 10 File information Comments

SHA256 hash: fc2e04d392ab5e508fdf6c90ce456bfd0af6def1f10a2074f82df8f58079d5e4
SHA3-384 hash: 4dadd153deda98036304caa7ccb958c01ac650b29b2f7c2b363050e9ec92a7dcf6ac09c4426d2c01fc9634707a370da3
SHA1 hash: 2e4cd2c7cacd2b434b2ae0f3c898d3e3e2b7e51b
MD5 hash: bc9bcb032e5015bf47efe154f0e6a206
humanhash: delta-pluto-london-bacon
File name:FC2E04D392AB5E508FDF6C90CE456BFD0AF6DEF1F10A2.exe
Download: download sample
Signature GCleaner
File size:3'444'348 bytes
First seen:2021-10-25 05:05:35 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 32569d67dc210c5cb9a759b08da2bdb3 (122 x RedLineStealer, 42 x DiamondFox, 37 x RaccoonStealer)
ssdeep 98304:xrCvLUBsgTiVLgItkC8ekLTfcEJhfIlV9WsEsd:xQLUCgTIthEJRI/9jb
TLSH T1DBF5330176C95DB9FD916232BB8CB7B6A0BDC2AC46700AC7778491086B3F951E17BE1C
File icon (PE):PE icon
dhash icon 848c5454baf47474 (2'088 x Adware.Neoreklami, 101 x RedLineStealer, 33 x DiamondFox)
Reporter abuse_ch
Tags:exe gcleaner


Avatar
abuse_ch
GCleaner C2:
93.115.20.139:28978

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
93.115.20.139:28978 https://threatfox.abuse.ch/ioc/227127/
91.206.14.151:16764 https://threatfox.abuse.ch/ioc/237116/

Intelligence


File Origin
# of uploads :
1
# of downloads :
151
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a window
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
SmokeLoader Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Disable Windows Defender real time protection (registry)
Downloads files with wrong headers with respect to MIME Content-Type
Found C&C like URL pattern
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for dropped file
Maps a DLL or memory area into another process
May check the online IP address of the machine
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Performs DNS queries to domains with low reputation
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Script Execution From Temp Folder
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected SmokeLoader
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 508374 Sample: FC2E04D392AB5E508FDF6C90CE4... Startdate: 25/10/2021 Architecture: WINDOWS Score: 100 81 thegymmum.com 2->81 83 renatazarazua.com 2->83 85 7 other IPs or domains 2->85 109 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->109 111 Multi AV Scanner detection for domain / URL 2->111 113 Found malware configuration 2->113 115 13 other signatures 2->115 11 FC2E04D392AB5E508FDF6C90CE456BFD0AF6DEF1F10A2.exe 15 2->11         started        signatures3 process4 file5 65 C:\Users\user\AppData\...\setup_install.exe, PE32 11->65 dropped 67 C:\Users\user\AppData\...\Tue14df7771140a.exe, PE32 11->67 dropped 69 C:\Users\user\...\Tue14d5c83cd6f6e941.exe, PE32 11->69 dropped 71 10 other files (5 malicious) 11->71 dropped 14 setup_install.exe 1 11->14         started        process6 dnsIp7 91 127.0.0.1 unknown unknown 14->91 93 hsiens.xyz 14->93 143 Performs DNS queries to domains with low reputation 14->143 145 Adds a directory exclusion to Windows Defender 14->145 18 cmd.exe 1 14->18         started        20 cmd.exe 14->20         started        22 cmd.exe 1 14->22         started        24 8 other processes 14->24 signatures8 process9 signatures10 27 Tue14763da6399edb6a0.exe 18->27         started        30 Tue1444a019a95f.exe 20->30         started        34 Tue14df7771140a.exe 22->34         started        117 Adds a directory exclusion to Windows Defender 24->117 36 Tue14bf2991c6d3.exe 24->36         started        38 Tue1463c606efd.exe 13 24->38         started        40 Tue1487f0a02d7f.exe 2 24->40         started        42 2 other processes 24->42 process11 dnsIp12 119 Multi AV Scanner detection for dropped file 27->119 121 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 27->121 123 Maps a DLL or memory area into another process 27->123 137 2 other signatures 27->137 44 explorer.exe 27->44 injected 95 212.192.241.62, 49763, 49777, 49782 RAPMSB-ASRU Russian Federation 30->95 97 37.0.10.214, 80 WKD-ASIE Netherlands 30->97 101 5 other IPs or domains 30->101 77 C:\Users\user\...77iceProcessX64[1].bmp, PE32+ 30->77 dropped 79 C:\Users\...Op9DnUlMPXgYNZkizsf5D8T.exe, PE32+ 30->79 dropped 125 May check the online IP address of the machine 30->125 127 Machine Learning detection for dropped file 30->127 129 Tries to harvest and steal browser information (history, passwords, etc) 30->129 131 Disable Windows Defender real time protection (registry) 30->131 48 EOp9DnUlMPXgYNZkizsf5D8T.exe 30->48         started        50 WerFault.exe 30->50         started        52 WerFault.exe 30->52         started        99 iplogger.org 88.99.66.31, 443, 49757, 49759 HETZNER-ASDE Germany 34->99 103 5 other IPs or domains 34->103 133 Antivirus detection for dropped file 34->133 135 Performs DNS queries to domains with low reputation 34->135 105 2 other IPs or domains 36->105 107 2 other IPs or domains 38->107 54 WerFault.exe 38->54         started        57 Tue1487f0a02d7f.exe 40->57         started        59 WerFault.exe 42->59         started        61 WerFault.exe 42->61         started        file13 signatures14 process15 dnsIp16 73 C:\Users\user\AppData\Roaming\suudtdv, PE32 44->73 dropped 139 Benign windows process drops PE files 44->139 75 C:\Users\...\pidHTSIGEi8DrAmaYu9K8ghN89.dll, PE32+ 48->75 dropped 87 live.goatgame.live 54->87 89 live.goatgame.live 57->89 63 conhost.exe 57->63         started        file17 141 Performs DNS queries to domains with low reputation 89->141 signatures18 process19
Threat name:
Win32.Trojan.ArkeiStealer
Status:
Malicious
First seen:
2021-08-25 02:18:35 UTC
AV detection:
22 of 28 (78.57%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
agenttesla raccoon
Result
Malware family:
Score:
  10/10
Tags:
family:raccoon family:redline family:smokeloader family:socelars family:vidar botnet:706 botnet:8dec62c1db2959619dca43e02fa46ad7bd606400 botnet:933 botnet:937 aspackv2 backdoor evasion infostealer spyware stealer suricata themida trojan vmprotect
Behaviour
Checks SCSI registry key(s)
Creates scheduled task(s)
Kills process with taskkill
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
Themida packer
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
VMProtect packed file
Vidar Stealer
Modifies Windows Defender Real-time Protection settings
Process spawned unexpected child process
Raccoon
RedLine
RedLine Payload
SmokeLoader
Socelars
Socelars Payload
Suspicious use of NtCreateProcessExOtherParentProcess
Vidar
suricata: ET MALWARE GCleaner Downloader Activity M5
suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01
suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2
Malware Config
C2 Extraction:
https://eduarroma.tumblr.com/
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
http://xacokuo8.top/
http://hajezey1.top/
https://mas.to/@xeroxxx
Unpacked files
SH256 hash:
feacf0ca0c6af0eba09c8e235527d1eb0979005051ef68abba1a38f7815c0f84
MD5 hash:
806c20eb3d12ef4ed586250503b66948
SHA1 hash:
92d0c7844988c60a21b8bbbeb55aa350a3499254
SH256 hash:
a18e5d223da775448e2e111101fe1f4ab919be801fd435d3a278718aa5e6ccba
MD5 hash:
0c6cae115465a83f05d3ff391fd009ac
SHA1 hash:
066ea93bb540ae4be0d2e522d4bb59eec74053ad
Detections:
win_vidar_auto
SH256 hash:
a62e66255f1d647de0fb7fb0f06a2d6abed2af113658be7fe19784834c0a3236
MD5 hash:
b3da7b927138d84f8bbf8d0da66a0cdb
SHA1 hash:
efb2c0bbbd47f4265c50946577976fedb92a3164
SH256 hash:
351f07f268df734510522a84ee243ba1aff59b02010c019e8c0ef80feed0df10
MD5 hash:
d2d7a36949a508b8d135e42269de744b
SHA1 hash:
7ee49b92c1a0006d4a84955582b4659813faeb4f
SH256 hash:
05942fe67632d7cb440fd1f31bd55cfc8416bdab4da6ed8d84e8d3fd16c3f5d6
MD5 hash:
5fbf56cf05175a08ebbfd3ab8c29ab9e
SHA1 hash:
7412ee83a7568b1f6024ba4e1277e298d76e8738
SH256 hash:
926c960187fd0930d59b90c9fd01462fe1c925da02df63c11d9712cd88cedfe0
MD5 hash:
3f9ddaaf013888f3a18389b937bb9f78
SHA1 hash:
594820e0952c47be587b4602a76fda04278ec4e8
SH256 hash:
ebfdade495b4dd266a19b99f37fc55531d840e27056eb9212a9842d6102f8ba2
MD5 hash:
0b365a7603004a5c3607b0a424d0405b
SHA1 hash:
1025e337b6b7a75216a94efd797003cd300b026f
SH256 hash:
d4490123b202d01e892dea83d64edd812e29acb51b83b1034d4d9ddb5f896afa
MD5 hash:
beafce2fa1329ffdfb6aa1ee314f5708
SHA1 hash:
943351b31c9a63fcbefb4131c68720b3e5865d7e
SH256 hash:
20521a1a2a256caa1b1e5e4f6c1adfd2fabe9352fcc82ff84ef50745879fe0f9
MD5 hash:
ea88a2ada56a1118d46a91b6fdd44a61
SHA1 hash:
b8c3750a88537f6be33ff840a3156df5481d492b
SH256 hash:
fc2e04d392ab5e508fdf6c90ce456bfd0af6def1f10a2074f82df8f58079d5e4
MD5 hash:
bc9bcb032e5015bf47efe154f0e6a206
SHA1 hash:
2e4cd2c7cacd2b434b2ae0f3c898d3e3e2b7e51b
Malware family:
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_ASPack
Author:ditekSHen
Description:Detects executables packed with ASPack
Rule name:INDICATOR_SUSPICIOUS_EXE_Referenfces_Messaging_Clients
Author:ditekSHen
Description:Detects executables referencing many email and collaboration clients. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation
Author:ditekSHen
Description:Detects executables containing potential Windows Defender anti-emulation checks
Rule name:MALWARE_Win_DLInjector03
Author:ditekSHen
Description:Detects unknown loader / injector
Rule name:MALWARE_Win_Raccoon
Author:ditekSHen
Description:Raccoon stealer payload
Rule name:MALWARE_Win_Vidar
Author:ditekSHen
Description:Detects Vidar / ArkeiStealer
Rule name:RedOctoberPluginCollectInfo
Rule name:Vidar
Author:kevoreilly
Description:Vidar Payload
Rule name:win_raccoon_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.raccoon.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments