MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0cfb7bcb7fec9c1387f38ecd7ebb9456ff4a1d797d0edfb3b467ff9a7661d8ed. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 4


Intelligence 4 IOCs YARA 1 File information Comments

SHA256 hash: 0cfb7bcb7fec9c1387f38ecd7ebb9456ff4a1d797d0edfb3b467ff9a7661d8ed
SHA3-384 hash: c44d881a72bb523e8932bdb500b2e2094f0febdf7ca6659be8c899eb9d8263245fbae2c57fe2dfa31c5c99d560c6efbc
SHA1 hash: 7500e53fa48c0356a3e0f1067e25cf9e1ffc3ac0
MD5 hash: 22d8e679fb3d6a2fc740f4ea616b97cd
humanhash: hawaii-december-solar-mountain
File name:Purchase Order.exe
Download: download sample
Signature GuLoader
File size:73'728 bytes
First seen:2020-06-09 06:41:30 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 5b4f2c239ba7c6badd8fe4e714e584c7 (1 x GuLoader)
ssdeep 1536:b6uRtSMc/6CEpJgGv9Zria1kqUYti5pTAHb:HS6T/PBRMqb
Threatray 790 similar samples on MalwareBazaar
TLSH EA738E03A908D663F15406B15CA78AB91F1B7C244E829E8F31C9AF5FD9363516CAB32D
Reporter abuse_ch
Tags:exe GuLoader


Avatar
abuse_ch
Malspam distributing GuLoader:

HELO: server.vimsmail.com
Sending IP: 198.57.186.8
From: Angela <angela@texwelldone.com>
Reply-To: angela@texwelldone.com
Subject: Fwd: REQUEST FOR QUOTATION
Attachment: Purchase Order.zip (contains "Purchase Order.exe")

GuLoader payload URL:
https://drive.google.com/uc?export=download&id=1bG8yc_o-AM-F8_LsZPB79N1mq3YilFxt

Intelligence


File Origin
# of uploads :
1
# of downloads :
88
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Infostealer.Fareit
Status:
Malicious
First seen:
2020-06-09 03:06:02 UTC
AV detection:
23 of 31 (74.19%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of NtSetInformationThreadHideFromDebugger
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:win_vobfus_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

GuLoader

Executable exe 0cfb7bcb7fec9c1387f38ecd7ebb9456ff4a1d797d0edfb3b467ff9a7661d8ed

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments