MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0512c8c515096734e33d52d39d554b683466183859b968f3c3fc525be6acd69e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 0512c8c515096734e33d52d39d554b683466183859b968f3c3fc525be6acd69e
SHA3-384 hash: 98447852b180901a072591c9513eb1c3a368e818198a22c61027dde056629d9d057605183babef3739ff957e7f0e3d82
SHA1 hash: d42ea0954d9bf83a12a85ad01543a157099de63c
MD5 hash: bfe4aabcee56d9ea66622617e6a5fe4b
humanhash: golf-purple-arkansas-don
File name:grn.exe_
Download: download sample
Signature GuLoader
File size:122'880 bytes
First seen:2020-03-18 13:34:18 UTC
Last seen:2020-03-18 16:01:02 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash b2424c2d841534bf72c3d6f31827a81c (1 x GuLoader)
ssdeep 1536:wbzdIV2eDCsbvzlJAF4aSeH6iRNKipxXJT4r4580MFO/1aqY990:EZemaIF5OSzTHDME//Y990
Threatray 502 similar samples on MalwareBazaar
TLSH EEC37D43FB50D967D1198E3EAC46D292051BBC6A79D2DA4B39C87B1E78F40A1CF2DB10
Reporter oppimaniac
Tags:exe GuLoader

Intelligence


File Origin
# of uploads :
2
# of downloads :
98
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Injector
Status:
Malicious
First seen:
2020-03-18 14:54:09 UTC
AV detection:
24 of 31 (77.42%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

GuLoader

Executable exe 0512c8c515096734e33d52d39d554b683466183859b968f3c3fc525be6acd69e

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
VB_APILegacy Visual Basic API usedMSVBVM60.DLL::EVENT_SINK_AddRef

Comments