MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f5f509cbd11ce2cca22d0f3a50468a9403e63ec9b1542eabbb1d265ae4d6b453. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: f5f509cbd11ce2cca22d0f3a50468a9403e63ec9b1542eabbb1d265ae4d6b453
SHA3-384 hash: d56f06ad7b2b96abe8fbd7c3ece42c9de1d58e691e9a4cd641b101e48402af2a91f2e1c065177d433efa15ab8e9cf430
SHA1 hash: e5335a2302b8f6e8a7065e1760fdec11e146b2d0
MD5 hash: c770217949542a8e4e1ec35167a297cb
humanhash: carolina-potato-king-avocado
File name:ORDER-A01KS06499L.exe
Download: download sample
Signature GuLoader
File size:90'112 bytes
First seen:2020-05-12 16:20:56 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 60e6ca9e14035519cd34fbe399270f47 (1 x GuLoader)
ssdeep 768:1PYG1Px8QOhp2DOWpIjcul18c2ytHu8C0fwTCoj1qa8r6/HUN:y+PuQOhp2uco+9ytCaoBqas
Threatray 5'452 similar samples on MalwareBazaar
TLSH A0935B46B6D2C526D39A8EF15BADA354082BFD7419228C0374C13B2DBA36F53E52472F
Reporter abuse_ch
Tags:exe geo GuLoader KOR


Avatar
abuse_ch
Malspam distributing unidentified malware:

HELO: mail-smail-vm36.hanmail.net
Sending IP: 203.133.180.224
From: 주식회사 애드앤 <addmaker@hanmail.net>
Subject: FW: PO2005000097
Attachment: ORDER-A01KS06499L.IMG (contains "ORDER-A01KS06499L.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
86
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Fareit
Status:
Malicious
First seen:
2020-05-12 11:11:45 UTC
AV detection:
25 of 31 (80.65%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of NtSetInformationThreadHideFromDebugger
Checks QEMU agent state file
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

7cbaee697fe6f24e2679fb72599748b9

GuLoader

Executable exe f5f509cbd11ce2cca22d0f3a50468a9403e63ec9b1542eabbb1d265ae4d6b453

(this sample)

  
Dropped by
MD5 7cbaee697fe6f24e2679fb72599748b9
  
Delivery method
Distributed via e-mail attachment

Comments