MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 65c66c6b72a13458cab9f352cbf78c6d27377bf7f506ccaa61bbdd4b265a9953. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 2


Intelligence 2 IOCs YARA File information Comments

SHA256 hash: 65c66c6b72a13458cab9f352cbf78c6d27377bf7f506ccaa61bbdd4b265a9953
SHA3-384 hash: 38117f57578491bb297fa1b7486e032c48e9e401894f2b33acf37818ff90d9e7a66211a6b951368ee24f7961a49d118a
SHA1 hash: 30f794be80fc35eff90d531f270a1077bba0648e
MD5 hash: 6bb548f52322c411e40030352fd4025b
humanhash: bulldog-avocado-arkansas-wyoming
File name:COVID-19 UPDATE MSC AUSTRALIAN BUSINESS CONTINUITY PLAN ANNOUNCEMENT_PDF.7z
Download: download sample
Signature GuLoader
File size:47'023 bytes
First seen:2020-04-21 12:22:01 UTC
Last seen:Never
File type: 7z
MIME type:application/x-7z-compressed
ssdeep 768:Vrc12CtHti8BEW0QIEcja0ILu9CgPMt/VU5bn+HPcRuku5Dkr/sLD/GkM7r0ekvN:V2tFIEcjLd9Cg03Ubn+HP0u5Os/u7roN
TLSH 6A23024C0542946CBFA2A2F0195D3F71E4FE64E299D2CEEA07829540111FDF185FD376
Reporter abuse_ch
Tags:COVID-19 GuLoader gz


Avatar
abuse_ch
COVID-19 themed malspam distributing GuLoader:

HELO: mail.kawashima.co.id
Sending IP: 180.211.91.26
From: Thomas Wilson MSC <lilik@kawashima.co.id>
Subject: COVID-19 UPDATE // MSC AUSTRALIAN BUSINESS CONTINUITY PLAN\x0a ANNOUNCEMENT
Attachment: COVID-19 UPDATE MSC AUSTRALIAN BUSINESS CONTINUITY PLAN ANNOUNCEMENT_PDF.7z

GuLoader payload URL:
http://www.theelectronics4u.com/og/KELLY%20GIRLS_VvMmz171.bin

Intelligence


File Origin
# of uploads :
1
# of downloads :
85
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Injector
Status:
Malicious
First seen:
2020-04-21 12:35:31 UTC
File Type:
Binary (Archive)
Extracted files:
7
AV detection:
24 of 48 (50.00%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

GuLoader

7z 65c66c6b72a13458cab9f352cbf78c6d27377bf7f506ccaa61bbdd4b265a9953

(this sample)

  
Dropping
GuLoader
  
Delivery method
Distributed via e-mail attachment

Comments