MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 0d6ae470c3a3700a88b9a1c42d6216e0e0dd9ba7005c3fe8c7cdaa1108408fab. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
GuLoader
Vendor detections: 4
| SHA256 hash: | 0d6ae470c3a3700a88b9a1c42d6216e0e0dd9ba7005c3fe8c7cdaa1108408fab |
|---|---|
| SHA3-384 hash: | ec0e439bf484b319067464296623843332fac805ea2c408d1e5721c25f8038f9b962246016438a4f33eafa4dc2b94124 |
| SHA1 hash: | 816f98b9348bbbcae33099c91bd3209bbfe16c99 |
| MD5 hash: | 4dfa95e5a5769b1fb3a15945d6c38800 |
| humanhash: | utah-victor-mike-texas |
| File name: | Outstanding Payment_June_2020_PDF.exe |
| Download: | download sample |
| Signature | GuLoader |
| File size: | 65'536 bytes |
| First seen: | 2020-06-10 11:33:27 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 3aa305c04c0f8a05b7455057f446afb5 (1 x GuLoader) |
| ssdeep | 1536:bf94d4xRzy1Sktcb7rbmsEQMbU3fiTUSx:h4dLV2Xmh5Vx |
| Threatray | 861 similar samples on MalwareBazaar |
| TLSH | FD536C0F7E4DD193D2780BB0583696E11665AC288D02AE073F9DBF5ED9352C1B8E721D |
| Reporter | |
| Tags: | exe GuLoader |
abuse_ch
Malspam distributing GuLoader:HELO: mail.carryboy.com
Sending IP: 27.254.141.68
From: prasong@carryboy.com
Subject: RE: (122614) - update payment date
Attachment: Outstanding Payment_June_2020_PDF.rar (contains "Outstanding Payment_June_2020_PDF.exe")
GuLoader payload URL:
https://drive.google.com/uc?export=download&id=1rs0nA7SOO-FmePI2bk0wlxOzus4Rryyh
Intelligence
File Origin
# of uploads :
1
# of downloads :
87
Origin country :
n/a
Vendor Threat Intelligence
Detection:
n/a
Gathering data
Threat name:
Win32.Infostealer.Fareit
Status:
Malicious
First seen:
2020-06-10 11:35:05 UTC
AV detection:
26 of 31 (83.87%)
Threat level:
5/5
Detection(s):
Malicious file
Verdict:
malicious
Label(s):
guloader
Similar samples:
+ 851 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
5/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of NtSetInformationThreadHideFromDebugger
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.