MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 97e961ffd1883624c6629f8e621d86ac6388751a15a851c33eb12006ab9e1bff. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 97e961ffd1883624c6629f8e621d86ac6388751a15a851c33eb12006ab9e1bff
SHA3-384 hash: ecf1b716b25e7a686c667a9e6144194b9fcc18db681bd22c8fc8f44159a1587fb22eea04a286b8e7ea0ce0c051f577ea
SHA1 hash: f15f180cbec1bc326d592069e225039f742d3db0
MD5 hash: 7742d378ed84a9d448428470298de3b9
humanhash: papa-timing-papa-leopard
File name:purchase list.pdf.exe
Download: download sample
Signature GuLoader
File size:102'400 bytes
First seen:2020-03-30 16:40:14 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f757db26df96b65b64691d065d19b631 (1 x GuLoader)
ssdeep 1536:fS429cE1v/uHykZC0o1bcaeMFWTkMaxoY:fQDvKRC0m7d
Threatray 1'122 similar samples on MalwareBazaar
TLSH 7FA3C413FA00BCA5D1384DB59BB29B9C1355BF256E08BE43348D3EDE7AB11903152E9B
Reporter abuse_ch
Tags:COVID-19 exe GuLoader


Avatar
abuse_ch
COVID-19 malspam campaign distributing GuLoader->AgentTesla:

HELO: hhs.gov
Sending IP: 209.58.149.66
From: Sheila Conley <sheila.conley@hhs.gov>
Subject: URGENT NEED: U.S. Department of Health & Human Services/COVID-19 Face Mask/ Forehead thermometers
Attachment: purchase list.pdf.gz (contains "purchase list.pdf.exe")

GuLoader payload URL (AgentTesla):
https://onedrive.live.com/download?cid=7A5E689DD1DC641F&resid=7A5E689DD1DC641F%21107&authkey=AE9g4jRbU5iqkJ8

Intelligence


File Origin
# of uploads :
1
# of downloads :
91
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Fareit
Status:
Malicious
First seen:
2020-03-30 18:59:00 UTC
File Type:
PE (Exe)
Extracted files:
6
AV detection:
26 of 30 (86.67%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Dropping
AgentTesla
  
Delivery method
Distributed via e-mail attachment

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
VB_APILegacy Visual Basic API usedMSVBVM60.DLL::EVENT_SINK_AddRef

Comments