MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 25e1551ce3ed0f99ef77a16166273dacfbe6d0a37c9998a2f6c68639d21fc35e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
GuLoader
Vendor detections: 3
| SHA256 hash: | 25e1551ce3ed0f99ef77a16166273dacfbe6d0a37c9998a2f6c68639d21fc35e |
|---|---|
| SHA3-384 hash: | e840ee29c3e3d1271a897f98c21e44c90e1511cbd0c9ffdf624612a917e408f8cc9f9d241a2b3c7364fc55f1f5748e53 |
| SHA1 hash: | 465e80a994954da22a82c1a512c6e1fa74d85947 |
| MD5 hash: | e78af03b2d5d408c1d7bd0edaf3286e0 |
| humanhash: | beryllium-mexico-pluto-three |
| File name: | list.dwg.exe |
| Download: | download sample |
| Signature | GuLoader |
| File size: | 192'512 bytes |
| First seen: | 2020-05-28 07:29:14 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 0022c3edd1d1eaeae33a5878ee99acde (1 x GuLoader) |
| ssdeep | 1536:kyEdXsdlk45LunTMe6HYVpDdzHnKwqD9EyEWrXO2dQTPhbd:CmpaTVpsD9jm |
| Threatray | 160 similar samples on MalwareBazaar |
| TLSH | 98146B32B766DCA6DF450874D9D2C4F81424FC25C8064E5B72C07F2E75BA4D3A9A2B3A |
| Reporter | |
| Tags: | exe geo GuLoader KOR |
abuse_ch
Malspam distributing GuLoader:HELO: mail-smail-vm45.hanmail.net
Sending IP: 203.133.180.233
From: 로이 유 <chabeopsu@hanmail.net>
Subject: 견적요청의 件:HYUNDAI MASS QUARANTREAT PROJECT
Attachment: HYUNDAI MASS QUARANTREAT PROJECT.dwg.img (contains "list.dwg.exe")
GuLoader payload URL:
https://drive.google.com/uc?export=download&id=13P4tVpb0H0AY1JZPdC6ACdo1b0Hl9H7N
Intelligence
File Origin
# of uploads :
1
# of downloads :
79
Origin country :
n/a
Vendor Threat Intelligence
Detection:
n/a
Detection(s):
Gathering data
Threat name:
Win32.Trojan.Injector
Status:
Malicious
First seen:
2020-05-28 07:37:27 UTC
File Type:
PE (Exe)
Extracted files:
6
AV detection:
23 of 31 (74.19%)
Threat level:
2/5
Verdict:
malicious
Label(s):
guloader
Similar samples:
+ 150 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
5/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of NtSetInformationThreadHideFromDebugger
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.