Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-11-2024 06:43

General

  • Target

    1017f357d88223cb18ec43554b65f2ec3f2d67851c7723f3a21bf67d7f02f1c6.exe

  • Size

    336KB

  • MD5

    c0b51e91c6f8576cbee97763df849640

  • SHA1

    6b1dbce76de34eccf73f61b753fabd45f5dd2c36

  • SHA256

    1017f357d88223cb18ec43554b65f2ec3f2d67851c7723f3a21bf67d7f02f1c6

  • SHA512

    509fa13861e4da16adec7669de890f7f7c7271106d35de4abed46659ad8b30a3d17d17a59436363235fd7dca7662e045c1e5e3ac29c5a603bf82136c2b0aa3a1

  • SSDEEP

    6144:zXD8kXIof8Te9ykvR/LVuiK8a3PiaewuRJCsDp5k3Omxb6Kaq81:zTP54eUkvJZJK/3PiBHp15W/xW/qM

Malware Config

Extracted

Family

gcleaner

C2

gcc-partners.in

Signatures

  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • OnlyLogger

    A tiny loader that uses IPLogger to get its payload.

  • Onlylogger family
  • OnlyLogger payload 3 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1017f357d88223cb18ec43554b65f2ec3f2d67851c7723f3a21bf67d7f02f1c6.exe
    "C:\Users\Admin\AppData\Local\Temp\1017f357d88223cb18ec43554b65f2ec3f2d67851c7723f3a21bf67d7f02f1c6.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3880

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3880-0-0x0000000000400000-0x00000000047D1000-memory.dmp

    Filesize

    67.8MB

  • memory/3880-2-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/3880-1-0x00000000047E0000-0x000000000480E000-memory.dmp

    Filesize

    184KB

  • memory/3880-3-0x0000000000400000-0x00000000047D1000-memory.dmp

    Filesize

    67.8MB