MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 8630725356bc4afad2815f39d01238d6e10477e04d19b5fcedcafc93c7519683. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
GuLoader
Vendor detections: 3
| SHA256 hash: | 8630725356bc4afad2815f39d01238d6e10477e04d19b5fcedcafc93c7519683 |
|---|---|
| SHA3-384 hash: | a6faeeccee29bb0d69842ab8bd3ecc023358555c60ee263c1f22cf985e1317e54c983ff1f5ebd8e27a284acd58b259f0 |
| SHA1 hash: | 9a8789b9e1fa302ec7b4a839d19fb893f8585ae6 |
| MD5 hash: | 52beb3b7a2107f88d3b324cbde6a6fcf |
| humanhash: | sodium-bluebird-kansas-snake |
| File name: | New Order 4890660021.Pdf.exe |
| Download: | download sample |
| Signature | GuLoader |
| File size: | 114'688 bytes |
| First seen: | 2020-05-27 11:40:36 UTC |
| Last seen: | 2020-05-27 13:17:04 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | b1d74e9f6e09f3fde229c2c51ea441ca (1 x GuLoader) |
| ssdeep | 1536:dG9JEFSQ9s34BpBVjyr0K9q6+yFhvk6VvvW2TUvwAINaDgkfD:orE5sCBjyr26+yFK6dvljTk7 |
| Threatray | 950 similar samples on MalwareBazaar |
| TLSH | B4B3E653BDD0CC71EE308FF54E729B692D326E216D508F076E48BA0D2A7628F29E1745 |
| Reporter | |
| Tags: | exe GuLoader |
abuse_ch
Malspam distributing GuLoader:HELO: mxload.webglobe.sk
Sending IP: 212.57.32.37
From: Alma Blagoevgrad <esivakova@mlproduktion.sk>
Subject: New Order 05213
Attachment: New Order 4890660021.Pdf.rar (contains "New Order 4890660021.Pdf.exe")
GuLoader payload URL:
https://drive.google.com/uc?export=download&id=1ikmxrzTWKADX7EEoihvhHwta7DJkKVsT
Intelligence
File Origin
# of uploads :
2
# of downloads :
76
Origin country :
n/a
Vendor Threat Intelligence
Detection:
n/a
Detection(s):
Gathering data
Threat name:
Win32.Trojan.Fareit
Status:
Malicious
First seen:
2020-05-27 11:15:51 UTC
File Type:
PE (Exe)
Extracted files:
6
AV detection:
22 of 31 (70.97%)
Threat level:
2/5
Verdict:
malicious
Label(s):
guloader
Similar samples:
+ 940 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
5/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of NtSetInformationThreadHideFromDebugger
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.