MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5bc45e4356d18725afcfadc81b15317f2144140baa77b893a8732acdc689f43b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 5bc45e4356d18725afcfadc81b15317f2144140baa77b893a8732acdc689f43b
SHA3-384 hash: f89727fd804ca3a3c125483d67c1a0c9dd460787038750dfee9a2767268a3180ac4214be1ce1a5c4fcec97184a9b5e61
SHA1 hash: 21a1fb9117aa684a190d3fba1ab58efa7e61c618
MD5 hash: f89020108ab0d826d9664c1cbf5ea21f
humanhash: oregon-finch-mirror-romeo
File name:document.exe
Download: download sample
Signature GuLoader
File size:81'920 bytes
First seen:2020-06-05 13:40:19 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c033fe8c2f9caf42789c153ba3c4ad9d (1 x GuLoader)
ssdeep 1536:fB5DrdLtwAIGZBnjKwDwv7d+cqFZKVkRpPHg:fHrdhtt7EzAcqt/g
Threatray 5'118 similar samples on MalwareBazaar
TLSH 79838C13BD0C8842D05A4AB42D43EA992F27AD1848C3AE4B7544AF9FFD717936C9621F
Reporter abuse_ch
Tags:exe GuLoader


Avatar
abuse_ch
Malspam distributing GuLoader:

HELO: slot0.evstones.com
Sending IP: 45.95.169.27
From: Nicole Gapes<info@evstones.com>
Reply-To: gapes.nicole@yahoo.com
Subject: Property Purchase & Leasing
Attachment: document.img (contains "document.exe")

GuLoader payload URL:
https://rainbowisp.info/dot/js/piro.bin

Intelligence


File Origin
# of uploads :
1
# of downloads :
87
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Infostealer.Fareit
Status:
Malicious
First seen:
2020-06-05 13:41:05 UTC
AV detection:
22 of 29 (75.86%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of NtSetInformationThreadHideFromDebugger
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

f4990e3e1f300c5987476fb05befda6f

GuLoader

Executable exe 5bc45e4356d18725afcfadc81b15317f2144140baa77b893a8732acdc689f43b

(this sample)

  
Dropped by
MD5 f4990e3e1f300c5987476fb05befda6f
  
Delivery method
Distributed via e-mail attachment

Comments