Behavioral task
behavioral1
Sample
1500-221-0x0000000000400000-0x00000000016E1000-memory.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
1500-221-0x0000000000400000-0x00000000016E1000-memory.exe
Resource
win10v2004-20241007-en
General
-
Target
1500-221-0x0000000000400000-0x00000000016E1000-memory.dmp
-
Size
18.9MB
-
MD5
770909a10630d9c330e590c6bdba8ace
-
SHA1
52f8b80794a7bd2179061535e8019e67369a7227
-
SHA256
88c82f09cf5d7e20e1e83a2e6a4500982177f7e94d0d58e21c3aaf0561b2e17b
-
SHA512
5c515c4b3c701152c09681ae13cfa382e1796190413064ddb915df13b31318e17ee972c1ce58c79c30a230d7b666afc919a085e58dc01b0326f59abb554d47a5
-
SSDEEP
12288:jHbjVIj/9PKKkVlbDJ4M7FjJgmrCzDL6UUnBz3:3x4ojCmWvL6Uq
Malware Config
Extracted
gcleaner
ggg-cl.biz
45.9.20.13
Signatures
-
Gcleaner family
-
OnlyLogger payload 1 IoCs
Processes:
resource yara_rule sample family_onlylogger -
Onlylogger family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 1500-221-0x0000000000400000-0x00000000016E1000-memory.dmp
Files
-
1500-221-0x0000000000400000-0x00000000016E1000-memory.dmp.exe windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 198KB - Virtual size: 197KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ