MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cb62c35fede3c3b21e2d23591e557962491698c6b834ff03f0a42cf714cc2f24. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: cb62c35fede3c3b21e2d23591e557962491698c6b834ff03f0a42cf714cc2f24
SHA3-384 hash: df8a2555f8bcf4ef9515269fca88388b0f5fee780cfd430223364da5e46d7ab4cb9bec26afaf93b02fe5b3f8eaf1ec4e
SHA1 hash: 36234d19ad529c77122c0cd740b92803f5d02306
MD5 hash: f8c560a0ed5091b4a242b9cdd42d6fe6
humanhash: florida-bluebird-kilo-helium
File name:RFQ Request Order JUNE 2020 TT98949878820899999948943889834.exe
Download: download sample
Signature GuLoader
File size:77'824 bytes
First seen:2020-06-08 14:48:19 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash a64947da4a8dde1daee9f63de3b171db (1 x GuLoader)
ssdeep 1536:L31ysFY6TjMve+ZLLDRZ0goKKD6cpoog1zRmg:bQxuQmIZnuDoog1zRmg
Threatray 1'285 similar samples on MalwareBazaar
TLSH 7373AE1BBC04D552F05886B16D938A4E3712AE295A036D9B3A4B1FFFEC34AC25DE121D
Reporter abuse_ch
Tags:exe GuLoader


Avatar
abuse_ch
Malspam distributing GuLoader:

HELO: biz0.planete-import.net
Sending IP: 185.255.130.188
From: Ali ÇETİN <contacts@planete-import.net>
Subject: 新项目订单紧急 birusezyllever Request New Order JUNE-YYNBHHGBAOI/ TT#
Attachment: 2 RFQ Request Order JUNE 2020 TT98949878820899999948943889834.rar (contains "RFQ Request Order JUNE 2020 TT98949878820899999948943889834.exe")

GuLoader payload URL:
http://naturepack.cc/files/bin_ArPodh112.bin

Intelligence


File Origin
# of uploads :
1
# of downloads :
85
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Spyware.FormBook
Status:
Malicious
First seen:
2020-06-08 14:50:12 UTC
AV detection:
25 of 31 (80.65%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
Suspicious behavior: MapViewOfSection
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

GuLoader

Executable exe cb62c35fede3c3b21e2d23591e557962491698c6b834ff03f0a42cf714cc2f24

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments