MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 625d65e2f28c0eb382f79567e2688de8188fa6606f6add912c74305c6f560718. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
GuLoader
Vendor detections: 4
| SHA256 hash: | 625d65e2f28c0eb382f79567e2688de8188fa6606f6add912c74305c6f560718 |
|---|---|
| SHA3-384 hash: | 3e05597f8cc7cfc413ce4ff45bcbaf7132aaddf6e5ec9a5992e6f47b3b571f923f36c9191e32a48585a38b62ade86fa7 |
| SHA1 hash: | 45af662730bf2912f7333c88b8fcce6872166460 |
| MD5 hash: | 4638c767c31b5b1e4c142c460ad7968e |
| humanhash: | lithium-item-blue-batman |
| File name: | 777504307241.GenesisAWB_PDF.exe |
| Download: | download sample |
| Signature | GuLoader |
| File size: | 77'824 bytes |
| First seen: | 2020-06-08 12:14:14 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 2f526edf3118615c450f6dfbe7a3a069 (1 x GuLoader) |
| ssdeep | 768:60ysfNpuRnnPilTjATMLCU3xjOpTkRXQJtEWx4Be3KOeMmZO0z/g/klFJk:60ysFY6TjMoCGcp0goKKNl |
| Threatray | 2'251 similar samples on MalwareBazaar |
| TLSH | 8F73BF176808C591F18046B2ADA39F9D2223AD385D06AE873B5D6F9FFC346C25CE532D |
| Reporter | |
| Tags: | exe FedEx GuLoader |
abuse_ch
Malspam distributing GuLoader:HELO: mail-in-pg1.advancedserverdns.com
Sending IP: 103.12.211.15
From: FedEx CCS <clearance_cs@fedex.com>
Subject: [EXTERNAL] : FedEx PRE Notification of Arrival - AWB# 770116605315 // Jakarta: Need BC23 Confirmation
Attachment: 777504307241.GenesisAWB_PDF.gz (contains "777504307241.GenesisAWB_PDF.exe")
GuLoader payload URL:
https://asmobilya.com.tr/AmHome_bhPixbUN54.bin
https://cmdtech.com.vn/AmHome_bhPixbUN54.bin
Intelligence
File Origin
# of uploads :
1
# of downloads :
84
Origin country :
n/a
Vendor Threat Intelligence
Detection:
n/a
Gathering data
Threat name:
Win32.Trojan.Vebzenpak
Status:
Malicious
First seen:
2020-06-07 23:50:28 UTC
AV detection:
27 of 29 (93.10%)
Threat level:
5/5
Detection(s):
Malicious file
Verdict:
malicious
Label(s):
lokipasswordstealer(pws)
guloader
Similar samples:
+ 2'241 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
5/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of NtSetInformationThreadHideFromDebugger
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.