MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2f4ed6ffb6539e4fd08da57d1d3577180598316972c284d344fb84c1c601a129. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: 2f4ed6ffb6539e4fd08da57d1d3577180598316972c284d344fb84c1c601a129
SHA3-384 hash: 46f74aa3e6d5f1f519c2f891d2a3821ba1a86600e556b48ba86f01f0b86c2ae861b8b4dc2dbb68d21b0ffd53bf1a86ce
SHA1 hash: af38ab9005998b922e7c791dffceb5b1634496f7
MD5 hash: 9dd792eb5cd0ca8aaf354fb198420913
humanhash: london-seven-carpet-quebec
File name:STOCKHOLM -SE BANK TELEX 32,000 EUROS.exe
Download: download sample
Signature GuLoader
File size:94'208 bytes
First seen:2020-05-23 11:50:46 UTC
Last seen:2020-05-23 13:13:18 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 3485fbe762bc53c3a90f8034b9982d87 (1 x GuLoader)
ssdeep 768:F3kYJcmdMpv0UnscwuYMxHeCgTH5Oc+1cbdnU2w3Ps9W1QqeQhGj1XixT3kg:hk0dgtnscXYMReRTZlER2wqqepVixDr
Threatray 10'631 similar samples on MalwareBazaar
TLSH 4E931A6BB940D872E9240EF11A728A585567ECB09D904B0378EE3B6D3E3374E99753C3
Reporter abuse_ch
Tags:exe GuLoader


Avatar
abuse_ch
Malspam distributing GuLoader:

HELO: biza0.feedtrades.com
Sending IP: 103.124.107.37
From: ACCOUNT9 <contacts@feedtrades.com>
Subject: FWD: RE: WELSFARGO-US BANK TELEX PAYMENT $32,000
Attachment: WIRE PAYMENT- WELSFARGO.IMG (contains "STOCKHOLM -SE BANK TELEX 32,000 EUROS.exe")

GuLoader payload URL:
http://185.205.209.166/wext/Rem-Stub21_xJNEDiadS140.bin

Intelligence


File Origin
# of uploads :
2
# of downloads :
64
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Injector
Status:
Malicious
First seen:
2020-05-22 23:02:00 UTC
File Type:
PE (Exe)
Extracted files:
6
AV detection:
19 of 30 (63.33%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of NtSetInformationThreadHideFromDebugger
Checks QEMU agent state file
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

GuLoader

Executable exe 2f4ed6ffb6539e4fd08da57d1d3577180598316972c284d344fb84c1c601a129

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments