MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c52ca2d3f581c0f1149d3538a985bb896755356d0c00abc546c142accaf0015d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: c52ca2d3f581c0f1149d3538a985bb896755356d0c00abc546c142accaf0015d
SHA3-384 hash: 604fc66718316bf7b91083fb685693044107a27ac4f3092533ddc0762495220353e4a0fb15b46504a5b85218df8a47c3
SHA1 hash: cd72ddfb800ebdc9bc5184691deff7b87d0a55fc
MD5 hash: 917c3af3662f454a377e453eeba29d7e
humanhash: texas-nevada-arizona-avocado
File name:PO#260520_pdf.exe
Download: download sample
Signature GuLoader
File size:122'880 bytes
First seen:2020-05-26 11:21:46 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 870955055df03756c5973373a9db04a3 (1 x GuLoader)
ssdeep 1536:7OGyS9pn0TOOWPRFHJL0iRWZf19qgr1U6578L4bAbN:629JAOVFprs75/bAJ
Threatray 135 similar samples on MalwareBazaar
TLSH 86C30817B4E95CA2D8184EB21C676D6B1E12BC3025620F1BB206F71E7B365CA2DF171A
Reporter abuse_ch
Tags:exe GuLoader


Avatar
abuse_ch
Malspam distributing GuLoader:

HELO: m13231.mail.qiye.163.com
Sending IP: 220.181.13.231
From: Sales <fuwubu@techmoris.com>
Subject: New Order (Urgent)
Attachment: PO260520_pdf.zip (contains "PO#260520_pdf.exe")

GuLoader payload URLs:
http://legalpros.lawyer/stuees/biggrc_JbGnQQX110.bin
http://keno-eneryg.com/stue/biggrc_JbGnQQX110.bin

Intelligence


File Origin
# of uploads :
1
# of downloads :
76
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Injector
Status:
Malicious
First seen:
2020-05-26 11:37:12 UTC
File Type:
PE (Exe)
Extracted files:
6
AV detection:
31 of 48 (64.58%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  6/10
Tags:
persistence
Behaviour
Suspicious behavior: MapViewOfSection
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Adds Run key to start application
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

GuLoader

Executable exe c52ca2d3f581c0f1149d3538a985bb896755356d0c00abc546c142accaf0015d

(this sample)

Comments