MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 128fa77a11cedbe782819f0d2e2666a04e4f8d2966a72f215c77b8933c914a47. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 128fa77a11cedbe782819f0d2e2666a04e4f8d2966a72f215c77b8933c914a47
SHA3-384 hash: 8e5b569749c14203faeb06ba92cf101a424d121ff888e1936cff43db0f29fdbe13b0c74aea4c08bce4e414d7a20c1261
SHA1 hash: db06ffb667569ab3b379012567c27919c36d885a
MD5 hash: 76b6c2b227dd2ae92bb3b86a66a8fe52
humanhash: oklahoma-hotel-jig-nuts
File name:Agreement Terms Sample.pdf.exe
Download: download sample
Signature GuLoader
File size:65'536 bytes
First seen:2021-01-13 20:07:08 UTC
Last seen:2021-01-13 21:59:34 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash e4e19abc2b8b3cdf6beb846e51c393a2 (4 x GuLoader)
ssdeep 768:tdhWOzU3SN+0MX6x7Z4LNeLmKETN3rWCC0Kg:/hWSUCN+1Xc7ONeFIJ3Hp
Threatray 4'536 similar samples on MalwareBazaar
TLSH C753BE2CED49D59AD64A73F13125CA8463F35528A7E3CF03FE541C913CBEAC52B81299
Reporter abuse_ch
Tags:exe GuLoader


Avatar
abuse_ch
Malspam distributing GuLoader:

HELO: core-hosting.eu
Sending IP: 5.253.179.29
From: Mr. Giuseppe Fazzina <g.fazzina@swisssteelgroup.com>
Subject: OUR PO#TA-LOC-20-0254
Attachment: Agreement Terms Sample.pdf.gz (contains "Agreement Terms Sample.pdf.exe")

GuLoader payload URL:
https://drive.google.com/uc?export=download&id=18g0x59dKntmW5wvsgrGhUW5SKboAY3zS

Intelligence


File Origin
# of uploads :
2
# of downloads :
236
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Agreement Terms & Sample.pdf.gz
Verdict:
Suspicious activity
Analysis date:
2021-01-13 10:25:31 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
Result
Threat name:
GuLoader
Detection:
malicious
Classification:
troj.evad
Score:
88 / 100
Signature
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Found potential dummy code loops (likely to delay analysis)
Initial sample is a PE file and has a suspicious name
Multi AV Scanner detection for submitted file
Potential time zone aware malware
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Uses an obfuscated file name to hide its real file extension (double extension)
Yara detected GuLoader
Yara detected VB6 Downloader Generic
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Malrep
Status:
Suspicious
First seen:
2021-01-13 08:30:59 UTC
AV detection:
11 of 28 (39.29%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Unpacked files
SH256 hash:
128fa77a11cedbe782819f0d2e2666a04e4f8d2966a72f215c77b8933c914a47
MD5 hash:
76b6c2b227dd2ae92bb3b86a66a8fe52
SHA1 hash:
db06ffb667569ab3b379012567c27919c36d885a
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

GuLoader

Executable exe 128fa77a11cedbe782819f0d2e2666a04e4f8d2966a72f215c77b8933c914a47

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments