MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e76ee0db44278c0742805ce66786923629cad847ee8c650214a36a1ebda37c69. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: e76ee0db44278c0742805ce66786923629cad847ee8c650214a36a1ebda37c69
SHA3-384 hash: 5f0824e854155412be216f3a1fbe6d2d633da6d25b05f7e2ee899e8572de245bc0777d0ac77bdec7e53be42f84226d46
SHA1 hash: 2eae224d2b2a34daf1a54d9f2440648a7d29a22c
MD5 hash: b5edf2cacba398125f9dd302b91be303
humanhash: harry-eleven-lima-six
File name:Detalles del pago.pdf.bat
Download: download sample
Signature GuLoader
File size:102'400 bytes
First seen:2020-05-21 19:28:15 UTC
Last seen:2020-05-21 20:45:07 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 5438f218591556e560a000890cb464d5 (1 x GuLoader)
ssdeep 1536:Y2dAMGIu1kD3KnP4a1SddBhqW5vi/+t0N:LAMi1kDanADTS+t0N
Threatray 489 similar samples on MalwareBazaar
TLSH FEA32734F6D0AC85EA9889F52F6647681917FCB524864B03A2CB3F6D39334C2D67634A
Reporter abuse_ch
Tags:bat GuLoader


Avatar
abuse_ch
Malspam distributing GuLoader:

HELO: aa98419.online-server.cloud
Sending IP: 74.208.129.40
From: Coreptec S.A. Christian Naranjo <Christian.Naranjo@coreptec.com>
Reply-To: Coreptec S.A. Christian Naranjo <Christian.Naranjo@coeptec.com>, Coreptec S.A. Christian Naranjo <Christian.Naranjo@coeptec.com>, Coreptec S.A. Christian Naranjo <Christian.Naranjo@coeptec.com>, Coreptec S.A. Christian Naranjo <Christian.Naranjo@coeptec.com>
Subject: Re: PAGO ATRÁS DEVUELTO TT (Ref 0180066743)
Attachment: Detalles del pago.pdf.gz (contains "Detalles del pago.pdf.bat")

GuLoader payload URL:
https://drive.google.com/uc?export=download&id=1h-BlkXoQsjYbeD9zseeUh8t1YEgG-v_5

Intelligence


File Origin
# of uploads :
2
# of downloads :
74
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Injector
Status:
Malicious
First seen:
2020-05-21 19:35:49 UTC
File Type:
PE (Exe)
Extracted files:
6
AV detection:
25 of 31 (80.65%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of NtSetInformationThreadHideFromDebugger
Checks QEMU agent state file
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

GuLoader

Executable exe e76ee0db44278c0742805ce66786923629cad847ee8c650214a36a1ebda37c69

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments