File name:

SecuriteInfo.com.Win32.Evo-gen.28376.20033

Full analysis: https://app.any.run/tasks/05fb2443-ac10-469c-af33-179da13bf3f1
Verdict: Malicious activity
Threats:

GCleaner is a type of malware loader that has the capability to deliver numerous malicious software programs, which differ based on the location of the targeted victim. This malware is commonly spread through fraudulent websites that advertise free PC optimization tools

Analysis date: February 11, 2025, 18:02:36
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
themida
golang
gcleaner
loader
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, 7 sections
MD5:

74075A1F3749894C3FEACED189E5212A

SHA1:

904EE457C526DCD3243353DDCC41635288653A32

SHA256:

000B8AABF249B098DEBF5272810CA2DDA8E48F001DA966BA8323DC1B3D8D0B39

SSDEEP:

98304:BQGLH32jtEThAX7LmbfmXxEGpSA7EwjiQJOOVpF1NmnTPB2dsV907DIt2vH//U//:Z+IQe

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • GCLEANER has been detected (SURICATA)

      • BitLockerToGo.exe (PID: 6860)
    • GENERIC has been found (auto)

      • BitLockerToGo.exe (PID: 6860)
  • SUSPICIOUS

    • Reads the BIOS version

      • SecuriteInfo.com.Win32.Evo-gen.28376.20033.exe (PID: 3532)
    • There is functionality for communication over UDP network (YARA)

      • SecuriteInfo.com.Win32.Evo-gen.28376.20033.exe (PID: 3532)
    • Reads security settings of Internet Explorer

      • BitLockerToGo.exe (PID: 6860)
    • Connects to the server without a host name

      • BitLockerToGo.exe (PID: 6860)
    • Executable content was dropped or overwritten

      • BitLockerToGo.exe (PID: 6860)
    • Potential Corporate Privacy Violation

      • BitLockerToGo.exe (PID: 6860)
  • INFO

    • Reads the computer name

      • SecuriteInfo.com.Win32.Evo-gen.28376.20033.exe (PID: 3532)
      • BitLockerToGo.exe (PID: 6860)
    • Detects GO elliptic curve encryption (YARA)

      • SecuriteInfo.com.Win32.Evo-gen.28376.20033.exe (PID: 3532)
    • Themida protector has been detected

      • SecuriteInfo.com.Win32.Evo-gen.28376.20033.exe (PID: 3532)
    • Drops encrypted JS script (Microsoft Script Encoder)

      • SecuriteInfo.com.Win32.Evo-gen.28376.20033.exe (PID: 3532)
    • Checks supported languages

      • SecuriteInfo.com.Win32.Evo-gen.28376.20033.exe (PID: 3532)
      • BitLockerToGo.exe (PID: 6860)
    • Application based on Golang

      • SecuriteInfo.com.Win32.Evo-gen.28376.20033.exe (PID: 3532)
    • Creates files or folders in the user directory

      • BitLockerToGo.exe (PID: 6860)
    • Checks proxy server information

      • BitLockerToGo.exe (PID: 6860)
    • Reads the machine GUID from the registry

      • BitLockerToGo.exe (PID: 6860)
    • Create files in a temporary directory

      • BitLockerToGo.exe (PID: 6860)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (52.9)
.exe | Generic Win/DOS Executable (23.5)
.exe | DOS Executable Generic (23.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 0000:00:00 00:00:00
ImageFileCharacteristics: Executable, 32-bit, No debug
PEType: PE32
LinkerVersion: 3
CodeSize: 2949632
InitializedDataSize: 3344896
UninitializedDataSize: -
EntryPoint: 0xb44000
OSVersion: 6.1
ImageVersion: 1
SubsystemVersion: 6.1
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
127
Monitored processes
2
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start securiteinfo.com.win32.evo-gen.28376.20033.exe #GCLEANER bitlockertogo.exe

Process information

PID
CMD
Path
Indicators
Parent process
3532"C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Evo-gen.28376.20033.exe" C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Evo-gen.28376.20033.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
666
Modules
Images
c:\users\admin\appdata\local\temp\securiteinfo.com.win32.evo-gen.28376.20033.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6860"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
SecuriteInfo.com.Win32.Evo-gen.28376.20033.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
BitLocker To Go Reader
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\bitlockerdiscoveryvolumecontents\bitlockertogo.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
Total events
1 663
Read events
1 660
Write events
3
Delete events
0

Modification events

(PID) Process:(6860) BitLockerToGo.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(6860) BitLockerToGo.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(6860) BitLockerToGo.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
Executable files
4
Suspicious files
5
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
6860BitLockerToGo.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\RR3E01RZ\success[1].htmbinary
MD5:CFCD208495D565EF66E7DFF9F98764DA
SHA256:5FECEB66FFC86F38D952786C6D696C79C2DBC239DD4E91B46729D73A27FB57E9
6860BitLockerToGo.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\E4DJRUXW\fuckingdllENCR[1].dllbinary
MD5:4BC1EF6688690AF3DD8D3D70906A9F98
SHA256:7703A6B77C0B0935F5900A2D846CFA3AB59B46D03A1A0844F6BCB5CF9496B2FE
6860BitLockerToGo.exeC:\Users\admin\AppData\Local\Temp\sFZueerBdfWz0Kz8det2WAJ\Bunifu_UI_v1.5.3.dllexecutable
MD5:2ECB51AB00C5F340380ECF849291DBCF
SHA256:F1B3E0F2750A9103E46A6A4A34F1CF9D17779725F98042CC2475EC66484801CF
6860BitLockerToGo.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\KCV3KQBA\soft[1]executable
MD5:F49D1AAAE28B92052E997480C504AA3B
SHA256:36D96DD4C16B132358F28EFCD5C24B088AC181424B5C443777BFD27995C13BD0
6860BitLockerToGo.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\RR3E01RZ\service[1].htmbinary
MD5:CFCD208495D565EF66E7DFF9F98764DA
SHA256:5FECEB66FFC86F38D952786C6D696C79C2DBC239DD4E91B46729D73A27FB57E9
6860BitLockerToGo.exeC:\Users\admin\Desktop\YCL.lnkbinary
MD5:D22FEC24E443BABEAFF9739ED5C432AF
SHA256:1E8489F9474BA4DB414BC7E8AFAFDD56CD0951F5E1C1586979A4571E26B5C5A3
6860BitLockerToGo.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\KCV3KQBA\info[1].htmtext
MD5:FE9B08252F126DDFCB87FB82F9CC7677
SHA256:E63E7EBE4C2DB7E61FFC71AF0675E870BCDE0A9D8916E5B3BE0CB252478030BF
6860BitLockerToGo.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\AH8CR9J5\service[1].htmbinary
MD5:CFCD208495D565EF66E7DFF9F98764DA
SHA256:5FECEB66FFC86F38D952786C6D696C79C2DBC239DD4E91B46729D73A27FB57E9
6860BitLockerToGo.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\AH8CR9J5\dll[1]executable
MD5:2ECB51AB00C5F340380ECF849291DBCF
SHA256:F1B3E0F2750A9103E46A6A4A34F1CF9D17779725F98042CC2475EC66484801CF
6860BitLockerToGo.exeC:\Users\admin\AppData\Local\Temp\sFZueerBdfWz0Kz8det2WAJ\Y-Cleaner.exeexecutable
MD5:F49D1AAAE28B92052E997480C504AA3B
SHA256:36D96DD4C16B132358F28EFCD5C24B088AC181424B5C443777BFD27995C13BD0
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
20
TCP/UDP connections
27
DNS requests
13
Threats
21

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1176
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6860
BitLockerToGo.exe
GET
200
185.156.73.73:80
http://185.156.73.73/success?substr=mixtwo&s=three&sub=non
unknown
unknown
6860
BitLockerToGo.exe
GET
200
185.156.73.73:80
http://185.156.73.73/info
unknown
unknown
6860
BitLockerToGo.exe
GET
200
185.156.73.73:80
http://185.156.73.73/update
unknown
unknown
6860
BitLockerToGo.exe
GET
200
185.156.73.73:80
http://185.156.73.73/service
unknown
unknown
6860
BitLockerToGo.exe
GET
200
185.156.73.73:80
http://185.156.73.73/service
unknown
unknown
6860
BitLockerToGo.exe
GET
200
185.156.73.73:80
http://185.156.73.73/service
unknown
unknown
6860
BitLockerToGo.exe
GET
200
185.156.73.73:80
http://185.156.73.73/service
unknown
unknown
6920
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6860
BitLockerToGo.exe
GET
200
185.156.73.73:80
http://185.156.73.73/service
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5064
SearchApp.exe
2.16.204.134:443
Akamai International B.V.
DE
unknown
4500
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1176
svchost.exe
20.190.159.131:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1176
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
1076
svchost.exe
23.35.238.131:443
go.microsoft.com
AKAMAI-AS
DE
whitelisted
6860
BitLockerToGo.exe
185.156.73.73:80
OOO SibirInvest
RU
unknown
4
System
192.168.100.255:137
whitelisted
6920
SIHClient.exe
20.109.210.53:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
whitelisted
login.live.com
  • 20.190.159.131
  • 40.126.31.130
  • 40.126.31.73
  • 20.190.159.2
  • 40.126.31.0
  • 40.126.31.3
  • 20.190.159.73
  • 40.126.31.69
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
go.microsoft.com
  • 23.35.238.131
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted
arc.msn.com
  • 20.223.35.26
whitelisted
fd.api.iris.microsoft.com
  • 20.223.36.55
whitelisted
nexusrules.officeapps.live.com
  • 52.111.243.31
whitelisted

Threats

PID
Process
Class
Message
6860
BitLockerToGo.exe
A Network Trojan was detected
LOADER [ANY.RUN] GCleaner HTTP Header
6860
BitLockerToGo.exe
A Network Trojan was detected
LOADER [ANY.RUN] GCleaner HTTP Header
6860
BitLockerToGo.exe
A Network Trojan was detected
LOADER [ANY.RUN] GCleaner HTTP Header
6860
BitLockerToGo.exe
A Network Trojan was detected
LOADER [ANY.RUN] GCleaner HTTP Header
6860
BitLockerToGo.exe
A Network Trojan was detected
LOADER [ANY.RUN] GCleaner HTTP Header
6860
BitLockerToGo.exe
A Network Trojan was detected
LOADER [ANY.RUN] GCleaner HTTP Header
6860
BitLockerToGo.exe
A Network Trojan was detected
LOADER [ANY.RUN] GCleaner HTTP Header
6860
BitLockerToGo.exe
A Network Trojan was detected
LOADER [ANY.RUN] GCleaner HTTP Header
6860
BitLockerToGo.exe
A Network Trojan was detected
LOADER [ANY.RUN] GCleaner HTTP Header
6860
BitLockerToGo.exe
A Network Trojan was detected
LOADER [ANY.RUN] GCleaner HTTP Header
Process
Message
SecuriteInfo.com.Win32.Evo-gen.28376.20033.exe
%s------------------------------------------------ --- Themida Professional --- --- (c)2012 Oreans Technologies --- ------------------------------------------------