Behavioral task
behavioral1
Sample
560-73-0x0000000000400000-0x00000000013E8000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
560-73-0x0000000000400000-0x00000000013E8000-memory.exe
Resource
win10v2004-20221111-en
General
-
Target
560-73-0x0000000000400000-0x00000000013E8000-memory.dmp
-
Size
15.9MB
-
MD5
a521acf76193e38f51d033901f747a2b
-
SHA1
5577ee3f08a4b3d5b0325a165d7e8280cea2591b
-
SHA256
f5cbc352855d876ffa484a846b64ea5b4a82bb8d5708d9d6e78b05c55c012176
-
SHA512
8cc3c7bebe29d740b429347b51699a88f45c51ba93b2d2381515c70b78a09b0e180dd6d9092454438f0e02da8c23cb9d4ba49b5657388a6a2045636ac4473a93
-
SSDEEP
12288:vga47jEnle/EQPlm0Nz70jNS9BQaZRFFLOSfmioG:Hnlf7iB/8SO0
Malware Config
Extracted
gcleaner
45.139.105.171
85.31.46.167
107.182.129.235
171.22.30.106
Signatures
-
Gcleaner family
Files
-
560-73-0x0000000000400000-0x00000000013E8000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 177KB - Virtual size: 177KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 59KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 76KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ