MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 d471a26ba030922f886a2ec9556784f9e38f07f8ae43281b7191fd7a34ef9750. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
GuLoader
Vendor detections: 3
| SHA256 hash: | d471a26ba030922f886a2ec9556784f9e38f07f8ae43281b7191fd7a34ef9750 |
|---|---|
| SHA3-384 hash: | dd9be2d59b4de429e6d897132e69e42a412a03700ffc0084b0a57eff79b98b5555b1ff44befaa80bdd3384d814d292ec |
| SHA1 hash: | 0c9750f8b0e64f9c0f7b928a6372be87adc2f951 |
| MD5 hash: | ef41d80e878e3c0e97f277628cd15b9b |
| humanhash: | failed-florida-fourteen-lithium |
| File name: | 2020-05-22.exe |
| Download: | download sample |
| Signature | GuLoader |
| File size: | 90'112 bytes |
| First seen: | 2020-05-22 09:56:57 UTC |
| Last seen: | 2020-05-22 10:52:03 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | b3bfc43fde343d8f3410181af51938ab (2 x GuLoader) |
| ssdeep | 768:sQ8OCgqwaV7D2YpXC8LwW5Zl8VJpFyjpzpbp5aMB0553DU:vBzMDhg8nr8VbgpFbpE7w |
| Threatray | 243 similar samples on MalwareBazaar |
| TLSH | 76930963F9D4EDE6EA4849B24921C9C405AFBD311E084F0B36CCBB1C79326CB6E95356 |
| Reporter | |
| Tags: | exe geo GuLoader KOR |
abuse_ch
Malspam distributing GuLoader:HELO: mail-smail-vm34.hanmail.net
Sending IP: 203.133.181.14
From: ChoongSung Kang <kookdo@hanmail.net>
Subject: (주)신성플랜트 강충성차장입니다. 긴급 주문합니다.
Attachment: 2020-05-22.IMG (contains "2020-05-22.exe")
GuLoader payload URL:
https://drive.google.com/uc?export=download&id=1EHd2rbMM3Uk3HLNpObCSrOSR-0b47MUm
Intelligence
File Origin
# of uploads :
2
# of downloads :
76
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Grp
Status:
Malicious
First seen:
2020-05-22 07:27:19 UTC
File Type:
PE (Exe)
Extracted files:
6
AV detection:
23 of 30 (76.67%)
Threat level:
2/5
Verdict:
malicious
Label(s):
guloader
Similar samples:
+ 233 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
7/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of NtSetInformationThreadHideFromDebugger
Checks QEMU agent state file
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.