Behavioral task
behavioral1
Sample
1496-108-0x0000000000400000-0x00000000013C5000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1496-108-0x0000000000400000-0x00000000013C5000-memory.exe
Resource
win10v2004-20240226-en
General
-
Target
1496-108-0x0000000000400000-0x00000000013C5000-memory.dmp
-
Size
15.8MB
-
MD5
9daa693e7d92c1c8d65468d6d632ff5b
-
SHA1
a9219da4dc55b3042b86c157480b94d8314da143
-
SHA256
510d9b34ae5ad8df283e55850f39cc4a351f1f5063c9794075bef392b7524f72
-
SHA512
3d5475c937e593c31bc68dae69e2b60847e66cc75d1aef29405cc77ce71a912b6b817b9319c694937d73c1a3d4e9fd0f900a66c7b54bfa62828c8b4e46cb6769
-
SSDEEP
12288:msYSsp5R3j0Tj4XaW4I7NM0B9a0OyBLOSfmiKG:S3JNBvISOq
Malware Config
Extracted
gcleaner
45.12.253.56
45.12.253.72
45.12.253.98
45.12.253.75
-
url_path
/default/puk.php
Signatures
-
Gcleaner family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1496-108-0x0000000000400000-0x00000000013C5000-memory.dmp
Files
-
1496-108-0x0000000000400000-0x00000000013C5000-memory.dmp.exe windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 177KB - Virtual size: 177KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 59KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 76KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ