Concrete signature match: Trojan - Appears legitimate but performs malicious actions for 32-bit Windows platform, family GCleaner
Trojan:Win32/GCleaner!rfn is a sophisticated Trojan capable of establishing command and control (C2) communication via IP 185.156.73.73, maintaining persistence through scheduled tasks and BITS jobs, and performing system manipulation like process termination and file deletion. It leverages legitimate Windows utilities such as Mshta, PowerShell, rundll32, and regsvr32 for evasion and execution of its malicious payload.
Relevant strings associated with this threat: - GCleaner.Properties.Resources (PEHSTR_EXT) - /f & erase (PEHSTR_EXT) - /c taskkill /im (PEHSTR_EXT) - 185.156.73.73 (PEHSTR_EXT) - .rsrc (PEHSTR_EXT) - .idata (PEHSTR_EXT) - !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT) - rundll32 (PEHSTR_EXT) - !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT) - !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT) - !#HSTR:ExecutionGuardrails (PEHSTR_EXT) - !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT) - !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT)
5892c047a128423e4c90e6923dc5476e4ea17790b2550e87a93b4e1e9c831e9e14c25ba4e521aa9dff9ef3af884cec759441d7bb48729e7f8231b2c071dc34b9Immediately isolate the infected host from the network. Perform a full system scan with updated antivirus software. Review system and network logs for C2 communication to 185.156.73.73 and other indicators of compromise. Block the malicious IP address at the firewall. Due to the advanced nature of this threat, consider re-imaging the affected system.