MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 43ba958550781f620df1ae656c60c1957ca5e34bde5c59db95ae5cffe303f0a9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 43ba958550781f620df1ae656c60c1957ca5e34bde5c59db95ae5cffe303f0a9
SHA3-384 hash: 270f328950fb109f26385ff320c4375f09cdcb03084c1272e707f8bc07b66bfb40c99d5f5fa1521a1d0da482d8075655
SHA1 hash: 527a97573cf148883bd9884a77dca2c4089134a6
MD5 hash: 7c6545fe02a59369977de45239d61ac0
humanhash: romeo-kansas-kilo-carolina
File name:Order_OH432-930.exe
Download: download sample
Signature GuLoader
File size:184'320 bytes
First seen:2020-05-12 16:27:55 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash bab72358089a9a92c5e8ebb545eb3616 (1 x GuLoader)
ssdeep 3072:p6fiwBxIFP+2IFqmjKBGy1U7lNvYYeWdWmFCREM7oNYs9SbIFOKGTIolY7B8NtIF:pK49O
Threatray 905 similar samples on MalwareBazaar
TLSH C804E84BF221FB12C34104F177A956EA5AFD5C7A68B1C417E3C071AD66B6B0AD4323A3
Reporter abuse_ch
Tags:exe GuLoader UPS


Avatar
abuse_ch
Malspam distributing unidentified malware:

HELO: tigers.unisonplatform.com
Sending IP: 72.34.62.164
From: UPS Express <smtpf0x-2dl5v@rent-a-car-4you.com>
Subject: Parcel delivery problem
Attachment: Order_OH432-930.img (contains "Order_OH432-930.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
88
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Malrep
Status:
Malicious
First seen:
2020-05-12 16:36:52 UTC
AV detection:
22 of 30 (73.33%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of NtSetInformationThreadHideFromDebugger
Checks QEMU agent state file
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

5abc20726b584b554a97f0db566adcd9

GuLoader

Executable exe 43ba958550781f620df1ae656c60c1957ca5e34bde5c59db95ae5cffe303f0a9

(this sample)

  
Dropped by
MD5 5abc20726b584b554a97f0db566adcd9
  
Delivery method
Distributed via e-mail attachment

Comments