MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 aa37bcba59760edc9f4242c1e6bb619c04d98c6d4b039fee3aee88bac894c21b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
GuLoader
Vendor detections: 3
| SHA256 hash: | aa37bcba59760edc9f4242c1e6bb619c04d98c6d4b039fee3aee88bac894c21b |
|---|---|
| SHA3-384 hash: | eef775ecfde043fd2c6c72a0999e4cbf85f61aed62b88223814eb45022bc5fe7ae9f082832c76f48e760cb64f8766257 |
| SHA1 hash: | c100a3bc79383b678b0e89c32b7d281df457d7c2 |
| MD5 hash: | a2311eb2a29ee07d821723419cbab35b |
| humanhash: | iowa-zebra-angel-india |
| File name: | SOA052020.bat |
| Download: | download sample |
| Signature | GuLoader |
| File size: | 110'592 bytes |
| First seen: | 2020-05-26 13:38:42 UTC |
| Last seen: | 2020-05-26 15:24:27 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f0ab93b976905cb72fb1953eb0c3d9b6 (1 x GuLoader) |
| ssdeep | 1536:zTr4rtZj2GukE/JIauaLznQPmmeCdZkX0IJ:/EXiGHSTwZHU |
| Threatray | 5'323 similar samples on MalwareBazaar |
| TLSH | 1DB3F65A35CDACBAED348FF148718AA25D32AD3568108F433C49F71E297698E2C7135E |
| Reporter | |
| Tags: | bat GuLoader |
abuse_ch
Malspam distributing GuLoader:HELO: mail.mailbox.co.id
Sending IP: 202.182.57.40
From: Fadhlan Dani <dani@mailbox.co.id>
Subject: **TOP URGENT** Outstanding SOA/Payment Advice
Attachment: SOA052020.pdf.ace (contains "SOA052020.bat")
GuLoader payload URL:
https://drive.google.com/uc?export=download&id=11M7M9sK_A6jz-zYNOEbg3_vlLiJ8T9GL
Intelligence
File Origin
# of uploads :
2
# of downloads :
77
Origin country :
n/a
Vendor Threat Intelligence
Detection:
n/a
Detection(s):
Gathering data
Threat name:
Win32.Trojan.Injector
Status:
Malicious
First seen:
2020-05-26 14:36:07 UTC
AV detection:
31 of 48 (64.58%)
Threat level:
2/5
Verdict:
malicious
Label(s):
guloader
Similar samples:
+ 5'313 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
5/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of NtSetInformationThreadHideFromDebugger
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.