MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0e3dc6ef2566c39ad59779b75b29288f9d5d5313240e68641e211c8a427b670d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: 0e3dc6ef2566c39ad59779b75b29288f9d5d5313240e68641e211c8a427b670d
SHA3-384 hash: 1efe825fd9e03872a312357b83d3b7138d75763c49c0f71852abcf692476e932d44476e68e2707a9a938cdee24bfcae2
SHA1 hash: 8259dce038c875b6e7e96bd68b26e3427c14efcf
MD5 hash: 8744448d01bd1cff1a5e79bd64efe126
humanhash: ack-happy-oranges-wyoming
File name:New-Payment-Order-PO09765.img
Download: download sample
Signature GuLoader
File size:1'245'184 bytes
First seen:2020-03-31 11:54:31 UTC
Last seen:Never
File type: img
MIME type:application/x-iso9660-image
ssdeep 768:1hi/ZffhOVzm3lPP78a8Wd0DuVOETvDW779ViXI7SvbW/8VGsTAHk:1hwfhO0lPVd0aVRrW779VihvzVGW
TLSH 7445C412FE04BCA4D1280DB68B759B9C13527E296E45AA4335CD3EDE7FF16943102E8B
Reporter abuse_ch
Tags:COVID-19 GuLoader img


Avatar
abuse_ch
COVID-19 themed malspam campaign distributing GuLoader, sent from Yahoo mailservers:

HELO: sonic315-43.consmr.mail.bf2.yahoo.com
Sending IP: 74.6.134.217
From: Bervin Teo <bervinteo@yahoo.com>
Subject: Covid-19 Transfer slip Down payment made to you company account
Attachments: New-Payment-Order-PO09765.img (contains "New-Purchase-Order-PO09765.exe")

GuLoader payload URL:
https://drive.google.com/uc?export=download&id=1zxWcClsNgcNjA860ENhdx2F6Ih_C9WqL

Intelligence


File Origin
# of uploads :
1
# of downloads :
90
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Noon
Status:
Malicious
First seen:
2020-03-31 12:35:46 UTC
File Type:
Binary (Archive)
Extracted files:
7
AV detection:
15 of 47 (31.91%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

GuLoader

img 0e3dc6ef2566c39ad59779b75b29288f9d5d5313240e68641e211c8a427b670d

(this sample)

  
Dropping
GuLoader
  
Delivery method
Distributed via e-mail attachment

Comments