MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 ca9d9bba55a17ac5f0a879efb36f842d2068f0c9844fb8e1285156cfb720d740. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
GuLoader
Vendor detections: 3
| SHA256 hash: | ca9d9bba55a17ac5f0a879efb36f842d2068f0c9844fb8e1285156cfb720d740 |
|---|---|
| SHA3-384 hash: | 8126343781f8384f55ae2670db7e8b6ca61f8ac12498fe75c5942c2ba61e7b33fad83da711d0ee8b8c7568a5f4294d05 |
| SHA1 hash: | a57859e60363b4ffc3f1cc78f2e0e0bc734cd13d |
| MD5 hash: | 3660289fd74bd36e8acb51ab5b3b94f9 |
| humanhash: | eleven-robin-twenty-timing |
| File name: | INVOICE.exe |
| Download: | download sample |
| Signature | GuLoader |
| File size: | 94'208 bytes |
| First seen: | 2020-05-22 10:19:10 UTC |
| Last seen: | 2020-05-22 10:52:02 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | e962f8212a952da5e058314d60017983 (2 x GuLoader) |
| ssdeep | 768:a50uqMtLGyQIoHfRPlFLytesVmDn/1uEmho8V5lBEEjhcXSTDY3vp:A0PMgI8JLLytRVo83hvEUcR |
| Threatray | 210 similar samples on MalwareBazaar |
| TLSH | 6893F726BA80DC73C5300FF15A728288507BACB1DB214F4BB9DA3B1DA53614D6B7539B |
| Reporter | |
| Tags: | exe GuLoader |
abuse_ch
Malspam distributing GuLoader:HELO: seed.net.tw
Sending IP: 139.175.54.24
From: Mauricio Mier <mamier@eldorado.com.uy>
Subject: SIGNED INVOICE
Attachment: INVOICE.r00 (contains "INVOICE.exe")
GuLoader payload URL:
https://drive.google.com/uc?export=download&id=1czd409N3punnxOPYasYBPh1On5hUEnTu
Intelligence
File Origin
# of uploads :
2
# of downloads :
78
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Netwire
Status:
Malicious
First seen:
2020-05-22 10:37:13 UTC
File Type:
PE (Exe)
Extracted files:
6
AV detection:
22 of 48 (45.83%)
Threat level:
2/5
Verdict:
malicious
Label(s):
guloader
Similar samples:
+ 200 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
7/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of NtSetInformationThreadHideFromDebugger
Checks QEMU agent state file
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.