Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06-01-2025 07:44

General

  • Target

    c44ca3f9c85fc705e9c908378f6efdbadcacd6c4c6fed2f9a57c4f5cf8a61698.exe

  • Size

    4.4MB

  • MD5

    9daf35ee204054a56e409a76cba9599a

  • SHA1

    0089b13d4d2853388eabf08029d8c01317533102

  • SHA256

    c44ca3f9c85fc705e9c908378f6efdbadcacd6c4c6fed2f9a57c4f5cf8a61698

  • SHA512

    4f7aae25c759250e10480a70957d240287950bd5c33a1ca404d3487cd6450d065815e6dce70ce9e8ba9575505b7a697faf888838c4324f1d8d29d9dcdb4d07f2

  • SSDEEP

    98304:CBvvQz+CfpZrr+rdLMWXg1wSWrrsep/0ATq:WUq5wAe

Malware Config

Extracted

Family

gcleaner

C2

45.139.105.39

37.139.129.24

45.139.105.66

45.139.105.188

Attributes
  • url_path

    /get.php

    /setup.php

    /setup.php

Signatures

  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c44ca3f9c85fc705e9c908378f6efdbadcacd6c4c6fed2f9a57c4f5cf8a61698.exe
    "C:\Users\Admin\AppData\Local\Temp\c44ca3f9c85fc705e9c908378f6efdbadcacd6c4c6fed2f9a57c4f5cf8a61698.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3008

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3008-0-0x0000000000400000-0x000000000165C000-memory.dmp

    Filesize

    18.4MB

  • memory/3008-2-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/3008-1-0x0000000000400000-0x000000000165C000-memory.dmp

    Filesize

    18.4MB

  • memory/3008-5-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/3008-4-0x0000000000400000-0x000000000165C000-memory.dmp

    Filesize

    18.4MB