MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fe5254468c8a6c7a17dc11f3e85b00db1b5b2b3c26919bdefb8d917ce35cb4d5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GCleaner


Vendor detections: 11


Intelligence 11 IOCs 3 YARA 10 File information Comments

SHA256 hash: fe5254468c8a6c7a17dc11f3e85b00db1b5b2b3c26919bdefb8d917ce35cb4d5
SHA3-384 hash: de599fa43d390c6c3d11a4a90957357490e389e8a7311fcf9d12c5d5a7c85eab53654d9e5d82e792341729fee2dc3a30
SHA1 hash: e50f322a92332202299fbd9b38e0ccd793058133
MD5 hash: f5881584c73a9416a65cbc5ca849f5bb
humanhash: pennsylvania-failed-orange-finch
File name:F5881584C73A9416A65CBC5CA849F5BB.exe
Download: download sample
Signature GCleaner
File size:415'744 bytes
First seen:2021-08-13 07:55:48 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash cc4caabe2c1a9c923331965c9764375d (3 x Pitou, 2 x RedLineStealer, 2 x GCleaner)
ssdeep 6144:/w93IXt3CxKqTlV+eAX25kXliWRi2HCZ0wVAqfMcbFqf55oV7RHoL:xXtyZieAX2ElJRi1ax5M
Threatray 1'162 similar samples on MalwareBazaar
TLSH T15A94AE30A6A0C035F4B712F845BA937DA92D7FA15B3051CF92E52AEE17346E5AC30787
dhash icon 9e62d8dc24ecb8e2 (1 x GCleaner)
Reporter abuse_ch
Tags:exe gcleaner


Avatar
abuse_ch
GCleaner C2:
http://ggc-partners.info/stats/remember.php

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://ggc-partners.info/stats/remember.php https://threatfox.abuse.ch/ioc/184297/
http://ggc-partners.info/dlc/distribution.php https://threatfox.abuse.ch/ioc/184298/
http://45.67.231.40/ https://threatfox.abuse.ch/ioc/184315/

Intelligence


File Origin
# of uploads :
1
# of downloads :
119
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
x86_x64_setup.exe
Verdict:
Malicious activity
Analysis date:
2021-08-11 05:21:41 UTC
Tags:
trojan evasion stealer vidar loader rat redline opendir phishing

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching the default Windows debugger (dwwin.exe)
DNS request
Connection attempt
Sending an HTTP GET request
Deleting a recently created file
Creating a file in the %temp% subdirectories
Running batch commands
Creating a process with a hidden window
Creating a process from a recently created file
Sending a UDP request
Connecting to a non-recommended domain
Reading critical registry keys
Delayed reading of the file
Sending a custom TCP request
Sending an HTTP POST request
Searching for the window
Creating a window
Using the Windows Management Instrumentation requests
Creating a file in the %AppData% subdirectories
Creating a file
Creating a file in the Program Files subdirectories
Launching a process
Launching cmd.exe command interpreter
Query of malicious DNS domain
Connection attempt to an infection source
Sending a TCP request to an infection source
Stealing user critical data
Launching a tool to kill processes
Sending an HTTP POST request to an infection source
Enabling autorun by creating a file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Raccoon Stealer
Verdict:
Malicious
Result
Threat name:
Cryptbot Raccoon RedLine
Detection:
malicious
Classification:
troj.spyw
Score:
100 / 100
Signature
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file access)
Yara detected Cryptbot
Yara detected Raccoon Stealer
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 464745 Sample: FK1S95NVRV.exe Startdate: 13/08/2021 Architecture: WINDOWS Score: 100 62 frekodi.top 2->62 64 api.ip.sb 2->64 66 iplogger.org 2->66 78 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->78 80 Multi AV Scanner detection for domain / URL 2->80 82 Found malware configuration 2->82 84 10 other signatures 2->84 9 FK1S95NVRV.exe 29 2->9         started        signatures3 process4 dnsIp5 72 damomw06.top 23.105.246.166, 49735, 49736, 49738 SERVERS-COMUS Russian Federation 9->72 74 frekodi.top 45.67.228.68, 49740, 80 SERVERIUS-ASNL Moldova Republic of 9->74 76 4 other IPs or domains 9->76 54 C:\Users\user\AppData\...\86082807204.exe, PE32 9->54 dropped 56 C:\Users\user\AppData\...\02758736455.exe, PE32 9->56 dropped 58 C:\Users\user\AppData\...\06608643747.exe, PE32 9->58 dropped 60 6 other files (none is malicious) 9->60 dropped 90 May check the online IP address of the machine 9->90 14 cmd.exe 1 9->14         started        16 cmd.exe 9->16         started        18 WerFault.exe 9 9->18         started        21 7 other processes 9->21 file6 signatures7 process8 file9 23 02758736455.exe 14->23         started        28 conhost.exe 14->28         started        30 86082807204.exe 16->30         started        32 conhost.exe 16->32         started        36 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 18->36 dropped 38 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 21->38 dropped 40 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 21->40 dropped 42 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 21->42 dropped 44 3 other malicious files 21->44 dropped process10 dnsIp11 68 telete.in 195.201.225.248, 443, 49744 HETZNER-ASDE Germany 23->68 70 45.67.231.40, 49745, 49751, 80 SERVERIUS-ASNL Moldova Republic of 23->70 46 C:\Users\user\AppData\...\vcruntime140.dll, PE32 23->46 dropped 48 C:\Users\user\AppData\...\ucrtbase.dll, PE32 23->48 dropped 50 C:\Users\user\AppData\...\softokn3.dll, PE32 23->50 dropped 52 56 other files (none is malicious) 23->52 dropped 86 Tries to steal Mail credentials (via file access) 23->86 34 WerFault.exe 23->34         started        88 Tries to harvest and steal browser information (history, passwords, etc) 30->88 file12 signatures13 process14
Threat name:
Win32.Trojan.Injuke
Status:
Malicious
First seen:
2021-08-10 13:58:17 UTC
AV detection:
15 of 28 (53.57%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:cryptbot family:danabot family:raccoon family:redline botnet:022f7f19749a47aa4d6a10b25bfd352ecb963373 botnet:mix 12.08 banker discovery infostealer persistence spyware stealer suricata trojan
Behaviour
Checks processor information in registry
Delays execution with timeout.exe
Kills process with taskkill
Modifies system certificate store
Runs ping.exe
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Deletes itself
Drops startup file
Loads dropped DLL
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Blocklisted process makes network request
Downloads MZ/PE file
Executes dropped EXE
CryptBot
CryptBot Payload
Danabot
Danabot Loader Component
Raccoon
Raccoon Stealer Payload
RedLine
RedLine Payload
Suspicious use of NtCreateProcessExOtherParentProcess
suricata: ET MALWARE AutoHotkey Downloader Checkin via IPLogger
suricata: ET MALWARE GCleaner Downloader Activity M1
suricata: ET MALWARE GCleaner Downloader Activity M2
suricata: ET MALWARE GCleaner Downloader Activity M3
suricata: ET MALWARE GCleaner Related Downloader User-Agent
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
Malware Config
C2 Extraction:
lysano52.top
morecj05.top
185.215.113.17:18597
Unpacked files
SH256 hash:
f7323271e93a6644941af87b37bb132586de5eef5fb70200bd8861cf5eca31e4
MD5 hash:
af124fe18df931321114af0228d5b1c8
SHA1 hash:
b969df5fd3f0817793e5fcdb6b9e8783d9bb03d0
SH256 hash:
fe5254468c8a6c7a17dc11f3e85b00db1b5b2b3c26919bdefb8d917ce35cb4d5
MD5 hash:
f5881584c73a9416a65cbc5ca849f5bb
SHA1 hash:
e50f322a92332202299fbd9b38e0ccd793058133
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_Binary_References_Browsers
Author:ditekSHen
Description:Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
Rule name:INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store
Author:ditekSHen
Description:Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_References_CryptoWallets
Author:ditekSHen
Description:Detects executables referencing many cryptocurrency mining wallets or apps. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_Referenfces_Messaging_Clients
Author:ditekSHen
Description:Detects executables referencing many email and collaboration clients. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:MALWARE_Win_CryptBot
Author:ditekSHen
Description:CryptBot/Fugrafa stealer payload
Rule name:MALWARE_Win_Raccoon
Author:ditekSHen
Description:Detects Raccoon/Racealer infostealer
Rule name:SUSP_XORed_Mozilla
Author:Florian Roth
Description:Detects suspicious XORed keyword - Mozilla/5.0
Reference:Internal Research
Rule name:win_cryptbot_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.cryptbot.
Rule name:win_raccoon_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.raccoon.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments