General

  • Target

    660-101-0x0000000000400000-0x00000000014EB000-memory.dmp

  • Size

    16.9MB

  • MD5

    432663c1d95bd54328469b38429e311d

  • SHA1

    c8259915634886116a07a4d1e81e2e43c1f9c420

  • SHA256

    acc6b5114233dd3e5283924034624dfaf2e9bb6824588ce5dc05344f1e105f90

  • SHA512

    39619cd2405870b1a6ace44168e077e0bfb18c2b887e5ba0218c3a99ec4861e081e75f74dd0a47778f21bd784312507a4b7f26c5ae4d8830f357bc836e3e0769

  • SSDEEP

    12288:msYSsp5R3j0Tj4XaW4I7NM0B9a0hy1LOSfmiOG:S3JNB2sSOK

Score
10/10

Malware Config

Extracted

Family

gcleaner

C2

45.12.253.56

45.12.253.72

45.12.253.98

45.12.253.75

Attributes
  • url_path

    /default/puk.php

Signatures

  • Gcleaner family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 660-101-0x0000000000400000-0x00000000014EB000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections