MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9b322d3c3a5bd842ae2563f5eb2ae4cf7957132311ccf051d7bfeb4601866a33. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: 9b322d3c3a5bd842ae2563f5eb2ae4cf7957132311ccf051d7bfeb4601866a33
SHA3-384 hash: baee02fed3f912b34c7d8b67250dbfb7aebdfb6fa482faca9ea0a1a654cf81c5040e230764d0a748e02b95f074997379
SHA1 hash: a790ffc436b91ca66d1efa7d5840ad19ebbd3e86
MD5 hash: 62180cb03ea671d98f58073efd6a4618
humanhash: fifteen-winter-illinois-bulldog
File name:9b322d3c3a5bd842ae2563f5eb2ae4cf7957132311ccf051d7bfeb4601866a33
Download: download sample
Signature GuLoader
File size:364'036 bytes
First seen:2020-06-03 08:23:07 UTC
Last seen:2020-06-03 09:25:50 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 173abfa8f7d7adac2a90a2e42625b7d9 (6 x GuLoader, 2 x Simda)
ssdeep 6144:93EmWPDNND9yRPzLq+YXFqaZiMLic9kzVd7EAC4TSs9Ei6:SmWhND9yJz+b1FcMLmp2ATTSsd6
Threatray 30 similar samples on MalwareBazaar
TLSH C6748E21F1C0807AE4F5157096FF7A5B246CA9B6472838D7E7986EC928741F27A3C2C7
Reporter raashidbhatt
Tags:exe GuLoader

Intelligence


File Origin
# of uploads :
2
# of downloads :
58
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Shiz
Status:
Malicious
First seen:
2020-06-03 11:08:29 UTC
AV detection:
30 of 31 (96.77%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
persistence
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: RenamesItself
Suspicious use of WriteProcessMemory
Drops file in Windows directory
Modifies WinLogon
Loads dropped DLL
Executes dropped EXE
Modifies WinLogon for persistence
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments