Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
23/02/2025, 23:51
Static task
static1
Behavioral task
behavioral1
Sample
rar.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
rar.exe
Resource
win10v2004-20250217-en
General
-
Target
rar.exe
-
Size
392KB
-
MD5
18488edb28f9d6bda06fa6bb7a3529c5
-
SHA1
6e0a4286e24a220701f1d460c3c57b12c446106b
-
SHA256
d6aa06fe25ed9f1b582251e01af0bbcb2d279f7fa57e8265c0823194793df309
-
SHA512
8781b7e204bff1f79378c4bdfd4dba14fd9a3a968d5f858d1f291e5166ebe912d7d7315824a76fba25e6bfba82be6b8d1245dc74909825889c8aea1ef1b16b2c
-
SSDEEP
6144:7DKqGZVEkU/krRcGV4wiiFCGJGh3CxHcTDH/MKItpZF2I:7eqmVXRcGV4wvCGJ+Cx8TDH/yXZF
Malware Config
Extracted
gcleaner
g-partners.top
g-partners.live
Signatures
-
Gcleaner family
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
Onlylogger family
-
OnlyLogger payload 5 IoCs
resource yara_rule behavioral2/memory/3208-2-0x00000000021D0000-0x00000000021FE000-memory.dmp family_onlylogger behavioral2/memory/3208-3-0x0000000000400000-0x0000000000431000-memory.dmp family_onlylogger behavioral2/memory/3208-5-0x0000000000400000-0x000000000046C000-memory.dmp family_onlylogger behavioral2/memory/3208-6-0x00000000021D0000-0x00000000021FE000-memory.dmp family_onlylogger behavioral2/memory/3208-7-0x0000000000400000-0x0000000000431000-memory.dmp family_onlylogger -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rar.exe