MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 10f957f6ae25382ddca0fc6fbd364f20d6e4cfa2f49728167bc1504cd3be0c46. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: 10f957f6ae25382ddca0fc6fbd364f20d6e4cfa2f49728167bc1504cd3be0c46
SHA3-384 hash: 510ff4c04963a1fad0af39e9e86819a69fdec505744dbd7964b5f6c7fad609685888adce862167e5273ab7d0cd648440
SHA1 hash: 150448888c8e7aaf06a8175d5f3b660265fa1e2a
MD5 hash: 8258714e7bc2ec82e01d0fb19215bec8
humanhash: summer-asparagus-alanine-maine
File name:Wyciag_26_08102045800000190201217926.scr
Download: download sample
Signature GuLoader
File size:236'904 bytes
First seen:2022-02-09 16:15:10 UTC
Last seen:2022-02-09 17:48:23 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 56a78d55f3f7af51443e58e0ce2fb5f6 (728 x GuLoader, 451 x Formbook, 295 x Loki)
ssdeep 3072:KbG7N2kDTHUpouekcFpY6Dl2ebeM1Gg2CzZC6KqNKZV89uv9TDJ/+1GF1jZAPEVd:KbE/HUfoemz2kZn8+uv9JG1G1sExyo
Threatray 1'542 similar samples on MalwareBazaar
TLSH T18F34F150B251DC5AE46305F1FC35E6F11AECAE05D63A8A4727627F4C79F3742243AE0A
File icon (PE):PE icon
dhash icon b270e896ceccd4cc (4 x GuLoader, 1 x AgentTesla)
Reporter Anonymous
Tags:exe GuLoader signed

Code Signing Certificate

Organisation:cholecystocolotomy
Issuer:cholecystocolotomy
Algorithm:sha256WithRSAEncryption
Valid from:2022-02-09T13:22:19Z
Valid to:2023-02-09T13:22:19Z
Serial number: 00
Intelligence: 325 malware samples on MalwareBazaar are signed with this code signing certificate
Cert Graveyard Blocklist:This certificate is on the Cert Graveyard blocklist
Thumbprint Algorithm:SHA256
Thumbprint: 02be4f5a3dfaee1f7e005390c03af064d2b5248b4830ddb90b4356075e654197
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
197
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Wyciag_26_08102045800000190201217926.scr
Verdict:
Malicious activity
Analysis date:
2022-02-09 16:14:39 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Launching a process
Creating a process with a hidden window
Creating a window
Creating a file
DNS request
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
control.exe guloader overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
48 / 100
Signature
Sigma detected: Suspicious Svchost Process
Tries to detect virtualization through RDTSC time measurements
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 569577 Sample: Wyciag_26_08102045800000190... Startdate: 09/02/2022 Architecture: WINDOWS Score: 48 22 Sigma detected: Suspicious Svchost Process 2->22 6 Wyciag_26_08102045800000190201217926.exe 24 2->6         started        10 explorer.exe 2->10         started        process3 file4 16 C:\Users\user\AppData\Local\...\vbsedit32.dll, PE32 6->16 dropped 18 C:\Users\user\AppData\Local\...\nsExec.dll, PE32 6->18 dropped 20 C:\Users\user\AppData\Local\...\System.dll, PE32 6->20 dropped 24 Tries to detect virtualization through RDTSC time measurements 6->24 12 explorer.exe 6->12         started        14 svchost.exe 10->14         started        signatures5 process6
Threat name:
Win32.Trojan.Shelsy
Status:
Malicious
First seen:
2022-02-09 16:16:11 UTC
File Type:
PE (Exe)
Extracted files:
50
AV detection:
16 of 28 (57.14%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Checks processor information in registry
Modifies data under HKEY_USERS
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Windows directory
Loads dropped DLL
Unpacked files
SH256 hash:
8dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8
MD5 hash:
cff85c549d536f651d4fb8387f1976f2
SHA1 hash:
d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e
SH256 hash:
0b2277d8aaf36e01aca3ae33e227b44bebc541a9c5cef6eb4fef93e96821a6cd
MD5 hash:
b1ba7a8263281244782ca5604876cb2c
SHA1 hash:
b8523dee6d7e74512a05c60cc35c0fddac370252
SH256 hash:
10f957f6ae25382ddca0fc6fbd364f20d6e4cfa2f49728167bc1504cd3be0c46
MD5 hash:
8258714e7bc2ec82e01d0fb19215bec8
SHA1 hash:
150448888c8e7aaf06a8175d5f3b660265fa1e2a
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments