MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 23f8a240f24779895ffce4e489da04e8cc2c705b2311e13a44432a6ef1b1b430. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: 23f8a240f24779895ffce4e489da04e8cc2c705b2311e13a44432a6ef1b1b430
SHA3-384 hash: 456c1d7cec315f59e1c1b259ad6cd763a8ff15ec833333d624191da511a2a28cfbd72d28b33800eabd829cab8ba2b436
SHA1 hash: 29798b445a8767bbce79e08982ca7b506fbd5222
MD5 hash: 3121c5a7b05389503738ce3dca194ebe
humanhash: london-burger-carpet-may
File name:KYOCERA.exe
Download: download sample
Signature GuLoader
File size:90'112 bytes
First seen:2020-05-22 09:45:38 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 86f4729ea3b9efe839b697b1c442184e (2 x GuLoader)
ssdeep 768:1o7/a1zVSZ0gHseC2dG90oqo0Ud7Pcmhjpkcbhg/P1kpJrpkIYGddma:qCzhRcmdpkr8uIbdQa
Threatray 1'660 similar samples on MalwareBazaar
TLSH 24932B56B8A8DCA6DD088DB06DA449D961FF7D312D540F0F38CE772D2A33882696930B
Reporter abuse_ch
Tags:exe GuLoader


Avatar
abuse_ch
Malspam distributing GuLoader:

HELO: ext42.host.am
Sending IP: 213.136.82.91
From: Krishna financials LLC <info@kts-me.com>
Subject: MT103 Payment in USD flagged _blocked transaction for your reference
Attachment: KYOCERA.arj (contains "KYOCERA.exe")

GuLoader payload URL:
https://drive.google.com/uc?export=download&id=16pdtfZQsIuTKlvUWbPTFf7qt38rdyUVy

Intelligence


File Origin
# of uploads :
1
# of downloads :
76
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Injector
Status:
Malicious
First seen:
2020-05-22 04:21:34 UTC
File Type:
PE (Exe)
Extracted files:
6
AV detection:
30 of 48 (62.50%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of NtSetInformationThreadHideFromDebugger
Checks QEMU agent state file
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

GuLoader

Executable exe 23f8a240f24779895ffce4e489da04e8cc2c705b2311e13a44432a6ef1b1b430

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments