MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 133ce4bf2cdca059541bc81ebbaea956bfdef7c4e2c215c03b102015777a7461. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 133ce4bf2cdca059541bc81ebbaea956bfdef7c4e2c215c03b102015777a7461
SHA3-384 hash: cee8cb2d9d4cad9a0b07134e0cd907379878d1feede1fc2b9391a84188a38b5e1ebf2c8a06e876de5bf8b9359210c2cd
SHA1 hash: 58be807fac4fb5c3cf069fa26023062a5ab0c36f
MD5 hash: fcf1d480a2cde154a2d17b0b930fbb79
humanhash: louisiana-kitten-oregon-apart
File name:Nueva lista de pedidos.exe
Download: download sample
Signature GuLoader
File size:590'046 bytes
First seen:2022-11-21 17:50:49 UTC
Last seen:2022-11-21 19:39:02 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 59a4a44a250c4cf4f2d9de2b3fe5d95f (70 x GuLoader, 13 x AgentTesla, 7 x AZORult)
ssdeep 12288:eh2tTTOKk+qiiiiiiiiiiiiiqRZVEn3R4OfFn2LXf:ehAk+qiiiiiiiiiiiiiqRMn3Rlf92bf
Threatray 1'057 similar samples on MalwareBazaar
TLSH T12FC46A517A80D456F4134D70E83AB8E6B624FDEED9402E5F7603BF2E2BBA0C78C16525
TrID 92.7% (.EXE) NSIS - Nullsoft Scriptable Install System (846567/2/133)
3.4% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
1.1% (.EXE) Win64 Executable (generic) (10523/12/4)
0.7% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
0.5% (.EXE) Win16 NE executable (generic) (5038/12/1)
File icon (PE):PE icon
dhash icon 29353663366273c6 (1 x GuLoader)
Reporter malwarelabnet
Tags:exe GuLoader

Intelligence


File Origin
# of uploads :
2
# of downloads :
278
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
guloader
ID:
1
File name:
Nueva lista de pedidos.exe
Verdict:
Malicious activity
Analysis date:
2022-11-21 17:52:08 UTC
Tags:
installer guloader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a window
Creating a file in the %AppData% subdirectories
Searching for the window
Delayed reading of the file
Creating a file
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
GuLoader, Lokibot
Detection:
malicious
Classification:
troj.evad.spyw
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for URL or domain
Creates a thread in another existing process (thread injection)
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Snort IDS alert for network traffic
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected GuLoader
Yara detected Lokibot
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 751074 Sample: Nueva lista de pedidos.exe Startdate: 21/11/2022 Architecture: WINDOWS Score: 100 29 smithzx.buzz 2->29 31 googlehosted.l.googleusercontent.com 2->31 33 2 other IPs or domains 2->33 43 Snort IDS alert for network traffic 2->43 45 Multi AV Scanner detection for domain / URL 2->45 47 Antivirus detection for URL or domain 2->47 49 4 other signatures 2->49 9 Nueva lista de pedidos.exe 501 2->9         started        signatures3 process4 file5 27 C:\Users\user\AppData\Local\...\System.dll, PE32 9->27 dropped 53 Writes to foreign memory regions 9->53 55 Tries to detect Any.run 9->55 13 ieinstal.exe 61 9->13         started        17 ieinstal.exe 9->17         started        19 ieinstal.exe 9->19         started        signatures6 process7 dnsIp8 37 smithzx.buzz 172.67.163.144, 49810, 49811, 49812 CLOUDFLARENETUS United States 13->37 39 drive.google.com 142.250.186.142, 443, 49808 GOOGLEUS United States 13->39 41 googlehosted.l.googleusercontent.com 142.250.186.33, 443, 49809 GOOGLEUS United States 13->41 57 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 13->57 59 Tries to steal Mail credentials (via file / registry access) 13->59 61 Tries to harvest and steal ftp login credentials 13->61 63 5 other signatures 13->63 21 lsass.exe 1 13->21 injected signatures9 process10 signatures11 51 Writes to foreign memory regions 21->51 24 svchost.exe 2 1 21->24         started        process12 dnsIp13 35 192.168.11.1 unknown unknown 24->35
Threat name:
Win32.Trojan.Guloader
Status:
Malicious
First seen:
2022-11-21 16:53:11 UTC
File Type:
PE (Exe)
Extracted files:
4
AV detection:
15 of 40 (37.50%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Enumerates physical storage devices
Drops file in Windows directory
Drops file in System32 directory
Loads dropped DLL
Unpacked files
SH256 hash:
b7ccb923387cc346731471b20fc3df1ead13ec8c2e3147353c71bb0bd59bc8b1
MD5 hash:
6f5257c0b8c0ef4d440f4f4fce85fb1b
SHA1 hash:
b6ac111dfb0d1fc75ad09c56bde7830232395785
SH256 hash:
133ce4bf2cdca059541bc81ebbaea956bfdef7c4e2c215c03b102015777a7461
MD5 hash:
fcf1d480a2cde154a2d17b0b930fbb79
SHA1 hash:
58be807fac4fb5c3cf069fa26023062a5ab0c36f
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments