MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 a57304043cdf4e54783b99ba437e2dedc5bded49da0878e17c459ba37e41bb55. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
GuLoader
Vendor detections: 3
| SHA256 hash: | a57304043cdf4e54783b99ba437e2dedc5bded49da0878e17c459ba37e41bb55 |
|---|---|
| SHA3-384 hash: | 933226285e95922eb197be54f6a41efd5c61a391f2f572e799ce44a4b6c3930c4be27814657afdc599702965eb9101aa |
| SHA1 hash: | d448f4d37d956b6cff94b138052ae82e9b88b1ca |
| MD5 hash: | 349102943dad118d0581c3f5e253e9d9 |
| humanhash: | dakota-nitrogen-nebraska-spaghetti |
| File name: | DOC22052020.exe |
| Download: | download sample |
| Signature | GuLoader |
| File size: | 94'208 bytes |
| First seen: | 2020-05-22 10:03:02 UTC |
| Last seen: | 2020-05-22 10:52:15 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 9e3640e71786502ec4d9e27f3161fb10 (2 x GuLoader) |
| ssdeep | 768:T8/n28tp5VJruvkuaYQ8NLK1RAXc5jHMZcNR7vF6TM05uVCcpyVrolZHhyws1:Q5pfJavkT8/4jsZm65co2ZHhyF |
| Threatray | 5'104 similar samples on MalwareBazaar |
| TLSH | D3933B2A7A54F9E6C9204FF11D32CAD40667BD3119520B077FCA7F6D2C32A4E9929393 |
| Reporter | |
| Tags: | exe GuLoader |
abuse_ch
Malspam distributing GuLoader:HELO: poc.creationfinancial.co.uk
Sending IP: 178.62.94.186
From: pablo <info@100gbit-ethernet.net>
Reply-To: kodak3399@protonmail.com
Subject: RE: 02-REQUEST FOR - STOCK
Attachment: DOC22052020.img (contains "DOC22052020.exe")
GuLoader payload URL:
https://noirrealtysolution.com//are/bin_bwocAPbwD126.bin
Intelligence
File Origin
# of uploads :
2
# of downloads :
75
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Grp
Status:
Malicious
First seen:
2020-05-22 10:37:07 UTC
File Type:
PE (Exe)
Extracted files:
6
AV detection:
23 of 48 (47.92%)
Threat level:
2/5
Verdict:
malicious
Label(s):
guloader
Similar samples:
+ 5'094 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
7/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of NtSetInformationThreadHideFromDebugger
Checks QEMU agent state file
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.