MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 c62acb5894988284f4effb5bd8ece3701c9fe7854d865bb75f2eb447556d9c8f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
GuLoader
Vendor detections: 3
| SHA256 hash: | c62acb5894988284f4effb5bd8ece3701c9fe7854d865bb75f2eb447556d9c8f |
|---|---|
| SHA3-384 hash: | a256b5dbdb958303da1c1d5467101b86b08ea4b9ac5c7c32e5359a126b8fd683fabd770b2a9bf10886e99fd0996904f0 |
| SHA1 hash: | 8372fcd72716ba5e2d5f354e73359e0104c348f0 |
| MD5 hash: | 49f8df45432c65920dbad1a33f1eb4b9 |
| humanhash: | lake-burger-single-oven |
| File name: | Scan Docs_pdf.exe |
| Download: | download sample |
| Signature | GuLoader |
| File size: | 184'320 bytes |
| First seen: | 2020-05-28 13:14:45 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | e21c8eebe33beaec2143109735de5f0e (1 x GuLoader) |
| ssdeep | 1536:3Cd/0T1t4TwSs9NGIGFiaftmTI3BqCjQaIcW6q8gXL:K/0B209NGIGFPaIRqCyl3L |
| Threatray | 655 similar samples on MalwareBazaar |
| TLSH | 5B044B26F348ECB5D66549B0D8E2C4F40431AC34C8178A6776D07F2E3A7E18D9D6AB72 |
| Reporter | |
| Tags: | exe GuLoader |
abuse_ch
Malspam distributing GuLoader:HELO: hosting.comfrel.org
Sending IP: 162.241.208.147
From: ROKONMA (S) PTE <azlina@rokonma.com.my>
Subject: Please send me price list.
Attachment: Scan Docs_pdf.gz (contains "Scan Docs_pdf.exe")
GuLoader payload URL:
https://drive.google.com/uc?export=download&id=1TGM04C2zh0icvRKXEOoymZI40WFDTdhd
Intelligence
File Origin
# of uploads :
1
# of downloads :
77
Origin country :
n/a
Vendor Threat Intelligence
Detection:
n/a
Detection(s):
Gathering data
Threat name:
Win32.Trojan.Injector
Status:
Malicious
First seen:
2020-05-28 11:27:34 UTC
File Type:
PE (Exe)
Extracted files:
6
AV detection:
19 of 48 (39.58%)
Threat level:
2/5
Verdict:
malicious
Label(s):
guloader
Similar samples:
+ 645 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
5/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of NtSetInformationThreadHideFromDebugger
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.