MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7030c2032fc9a3b15dc8720636f25403873ca65156611b7ccaa2928d716874b3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 7030c2032fc9a3b15dc8720636f25403873ca65156611b7ccaa2928d716874b3
SHA3-384 hash: d77578080c5f95d4c6a7bcb65dc13db04186c6f5a99982dc38528e0420b9a570000ebc76f8267416a6395d20695e0fd9
SHA1 hash: 49ba19e77e13ad59a094ef99745eba13950811ef
MD5 hash: abcccb20b527fcbcc1f27c3380b4e6d5
humanhash: lake-king-burger-oven
File name:viospiral ORDER.exe
Download: download sample
Signature GuLoader
File size:81'920 bytes
First seen:2020-05-04 21:22:22 UTC
Last seen:2020-05-04 21:51:42 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash df2474764f6756f144ac8ee0803135ad (1 x GuLoader)
ssdeep 768:eLSv2rw7MVlPfVIYu/59NmanvRmJubPQ0R5PL4Zt:nsBVltIYu/59NmgRmJubxR5zc
Threatray 838 similar samples on MalwareBazaar
TLSH 2F83B405BEB4EC32D04476B5DFAAF2AFC751AC311A31890769443B9E1F36A069E7035E
Reporter abuse_ch
Tags:exe GuLoader


Avatar
abuse_ch
Malspam distributing GuLoader:

HELO: mail.teilam.gr
Sending IP: 195.130.78.204
From: Jenny Vougiouklaki <v.jenny@viospiral.gr>
Subject: new Greece order
Attachment: viospiral ORDER.img (contains "viospiral ORDER.exe")

Intelligence


File Origin
# of uploads :
2
# of downloads :
92
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2020-05-05 04:03:16 UTC
File Type:
PE (Exe)
Extracted files:
6
AV detection:
22 of 31 (70.97%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of NtSetInformationThreadHideFromDebugger
Checks QEMU agent state file
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

GuLoader

Executable exe 7030c2032fc9a3b15dc8720636f25403873ca65156611b7ccaa2928d716874b3

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments