MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3480ae4f4ba35f9f2c70d89ad705ff9b64aab46de7e7df8942b1425d67d0eebc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 5


Intelligence 5 IOCs YARA 4 File information Comments

SHA256 hash: 3480ae4f4ba35f9f2c70d89ad705ff9b64aab46de7e7df8942b1425d67d0eebc
SHA3-384 hash: 9e50d43ec97ac63ec8ed165c3b34b419b517461981c97da53315b4ed9d66bc7dbb633a9104b0d6d13677a720cbd73542
SHA1 hash: 12ad5a2cca64e6a22752c923948d2ccf45c41fcc
MD5 hash: 5169115479eaa7b6ed82ee4baa2aea80
humanhash: louisiana-oscar-failed-arkansas
File name:rechnung.exe
Download: download sample
Signature GuLoader
File size:156'103 bytes
First seen:2020-06-03 13:39:09 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 87b244662c3b3d8e37b9ebb95847028d (1 x GuLoader)
ssdeep 3072:4H2P2p3J1wpfsx2lQBV+UdE+rECWp7hKt8imlD:4WP2HrBV+UdvrEFp7hKt8rx
Threatray 122 similar samples on MalwareBazaar
TLSH 89E3AE12654887E9E2D041B07C2A99156FE5A83C44DF069AB30F1B57AF7C7239ECC62F
Reporter abuse_ch
Tags:exe GuLoader


Avatar
abuse_ch
Malspam distributing GuLoader:

HELO: dd29502.kasserver.com
Sending IP: 85.13.151.31
From: Sebastian Klein <info@klein-gala.de>
Subject: AW: AW: Zahlungsbeleg und Auftragsbestätigung 2-06-20 Rechnung_20-613129926-001
Attachment: rechnung.zip (contains "rechnung.exe")

GuLoader payload URL:
http://156.96.118.179/slxslx-2RAW_gwKBF147.bin

Intelligence


File Origin
# of uploads :
1
# of downloads :
77
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Virus.Floxif
Status:
Malicious
First seen:
2020-06-03 13:45:50 UTC
File Type:
PE (Exe)
Extracted files:
8
AV detection:
44 of 48 (91.67%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
upx
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Drops file in Program Files directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Loads dropped DLL
UPX packed file
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Malware_Floxif_mpsvc_dll
Author:Florian Roth
Description:Malware - Floxif
Reference:Internal Research
Rule name:MAL_Floxif_Generic
Author:Florian Roth
Description:Detects Floxif Malware
Reference:Internal Research
Rule name:suspicious_packer_section
Author:@j0sm1
Description:The packer/protector section names/keywords
Reference:http://www.hexacorn.com/blog/2012/10/14/random-stats-from-1-2m-samples-pe-section-names/
Rule name:SUSP_Microsoft_Copyright_String_Anomaly_2
Author:Florian Roth
Description:Detects Floxif Malware
Reference:Internal Research

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

GuLoader

Executable exe 3480ae4f4ba35f9f2c70d89ad705ff9b64aab46de7e7df8942b1425d67d0eebc

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments