MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0e5007396123f9b1a018685b7cf2e42cc508b58ab216df305808f65408f21388. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 0e5007396123f9b1a018685b7cf2e42cc508b58ab216df305808f65408f21388
SHA3-384 hash: eaa1c4f307276f0f0ed25daa80a6a0a6c61ee6a33c3aaa43f3949ab14f1863792ebe017492d3e8d5628cdc7cad47e4c2
SHA1 hash: 37e371f26a51c4f6d8977bfebc312c164c2a5735
MD5 hash: 198b59cdc034f2191632c922d7f899ca
humanhash: jig-sodium-river-moon
File name:PO.exe
Download: download sample
Signature GuLoader
File size:86'016 bytes
First seen:2020-08-05 08:30:02 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 6d57a2066a14899d5d329f1129d874cc (5 x GuLoader)
ssdeep 768:raQS45mIEictcRkUtzZG1Fo4Vo0Y4F051G3+0XPPa:rVSJZictcRkURAFokonO3XPP
Threatray 600 similar samples on MalwareBazaar
TLSH C8832902B084E632F615C6B45B3951F7157ABC301656CF07A2487F2B3AFEE4E96A2353
Reporter abuse_ch
Tags:exe GuLoader


Avatar
abuse_ch
Malspam distributing GuLoader:

HELO: alibcompositeltd.pw
Sending IP: 104.168.190.254
From: "ART IMPEX GROUP LLP" <info@alibcompositeltd.pw>
Subject: RE: New Purchase Order
Attachment: PO.zip (contains "PO.exe")

GuLoader payload URL:
http://anakleather.ir/chukwukaa_pYDreKwXV241.bin

Intelligence


File Origin
# of uploads :
1
# of downloads :
136
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
56 / 100
Signature
Hides threads from debuggers
Tries to detect Any.run
Tries to detect virtualization through RDTSC time measurements
Writes to foreign memory regions
Behaviour
Behavior Graph:
behaviorgraph top1 process2 2 Behavior Graph ID: 257552 Sample: PO.exe Startdate: 05/08/2020 Architecture: WINDOWS Score: 56 6 PO.exe 1 2->6         started        signatures3 14 Writes to foreign memory regions 6->14 16 Tries to detect Any.run 6->16 18 Tries to detect virtualization through RDTSC time measurements 6->18 20 Hides threads from debuggers 6->20 9 RegAsm.exe 1 6->9         started        process4 signatures5 22 Tries to detect virtualization through RDTSC time measurements 9->22 12 conhost.exe 9->12         started        process6
Threat name:
Win32.Trojan.FormBook
Status:
Malicious
First seen:
2020-08-05 04:34:04 UTC
AV detection:
24 of 29 (82.76%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of SetWindowsHookEx
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

GuLoader

Executable exe 0e5007396123f9b1a018685b7cf2e42cc508b58ab216df305808f65408f21388

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments