MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 23f8a240f24779895ffce4e489da04e8cc2c705b2311e13a44432a6ef1b1b430. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
GuLoader
Vendor detections: 3
| SHA256 hash: | 23f8a240f24779895ffce4e489da04e8cc2c705b2311e13a44432a6ef1b1b430 |
|---|---|
| SHA3-384 hash: | 456c1d7cec315f59e1c1b259ad6cd763a8ff15ec833333d624191da511a2a28cfbd72d28b33800eabd829cab8ba2b436 |
| SHA1 hash: | 29798b445a8767bbce79e08982ca7b506fbd5222 |
| MD5 hash: | 3121c5a7b05389503738ce3dca194ebe |
| humanhash: | london-burger-carpet-may |
| File name: | KYOCERA.exe |
| Download: | download sample |
| Signature | GuLoader |
| File size: | 90'112 bytes |
| First seen: | 2020-05-22 09:45:38 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 86f4729ea3b9efe839b697b1c442184e (2 x GuLoader) |
| ssdeep | 768:1o7/a1zVSZ0gHseC2dG90oqo0Ud7Pcmhjpkcbhg/P1kpJrpkIYGddma:qCzhRcmdpkr8uIbdQa |
| Threatray | 1'660 similar samples on MalwareBazaar |
| TLSH | 24932B56B8A8DCA6DD088DB06DA449D961FF7D312D540F0F38CE772D2A33882696930B |
| Reporter | |
| Tags: | exe GuLoader |
abuse_ch
Malspam distributing GuLoader:HELO: ext42.host.am
Sending IP: 213.136.82.91
From: Krishna financials LLC <info@kts-me.com>
Subject: MT103 Payment in USD flagged _blocked transaction for your reference
Attachment: KYOCERA.arj (contains "KYOCERA.exe")
GuLoader payload URL:
https://drive.google.com/uc?export=download&id=16pdtfZQsIuTKlvUWbPTFf7qt38rdyUVy
Intelligence
File Origin
# of uploads :
1
# of downloads :
76
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Injector
Status:
Malicious
First seen:
2020-05-22 04:21:34 UTC
File Type:
PE (Exe)
Extracted files:
6
AV detection:
30 of 48 (62.50%)
Threat level:
5/5
Verdict:
malicious
Label(s):
guloader
lokipasswordstealer(pws)
Similar samples:
+ 1'650 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
7/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of NtSetInformationThreadHideFromDebugger
Checks QEMU agent state file
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.