Behavioral task
behavioral1
Sample
4988-173-0x0000000000400000-0x0000000002BED000-memory.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4988-173-0x0000000000400000-0x0000000002BED000-memory.exe
Resource
win10v2004-20231215-en
General
-
Target
4988-173-0x0000000000400000-0x0000000002BED000-memory.dmp
-
Size
39.9MB
-
MD5
3397504c6b352120e8a163a62e5efae0
-
SHA1
8617b76f687650373f1bde8b62da398744f34bc4
-
SHA256
d2a1d3b1ae34efee5619447224fd749a79a79172e4b44aa656d31551d75e902b
-
SHA512
1593d1bb213172c94d80a55243650b9801b5a15e849b37f3591a447f96d2d7304ee09e401d6c45f415886a52044fa0bcc3f44f949cc0e868fd3af539fd28dca2
-
SSDEEP
12288:6NTEpCcY05LKt8xQTSW3l5AbKH3ElwNrc:FNRpxQx3l5AbKH3UP
Malware Config
Extracted
gcleaner
185.172.128.90
5.42.64.3
5.42.65.115
Signatures
-
Gcleaner family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4988-173-0x0000000000400000-0x0000000002BED000-memory.dmp
Files
-
4988-173-0x0000000000400000-0x0000000002BED000-memory.dmp.exe windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 161KB - Virtual size: 161KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ