MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 14644b90f9828394755196c3654eb53b9c7a30623541ce557ab59e5a7ca394dc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
GuLoader
Vendor detections: 4
| SHA256 hash: | 14644b90f9828394755196c3654eb53b9c7a30623541ce557ab59e5a7ca394dc |
|---|---|
| SHA3-384 hash: | b64b1c8aff6fb30b2f9be39fdb1184f779508de284681f7fb96ca31c5e23389a8526572160351ffffb27fe460c9cede0 |
| SHA1 hash: | 221afa8e02a9420b38c389f63b36231d2f4e98b8 |
| MD5 hash: | 31841fda8c5fcdde447bd7db1f72fdd8 |
| humanhash: | sink-steak-hawaii-nineteen |
| File name: | RFQ-PO758596.7z |
| Download: | download sample |
| Signature | GuLoader |
| File size: | 60'144 bytes |
| First seen: | 2021-07-27 06:12:34 UTC |
| Last seen: | Never |
| File type: | 7z |
| MIME type: | application/x-rar |
| ssdeep | 1536:syVI6mUJfMUQiLQnSwMJCFOOMolikhvx1Sd3E1pFTJ:scI6mUVMUQikSwMJCFKojhvx1Sd6/t |
| TLSH | T18F43021FB232055E4EE64C2DBDB8244F5CA4EED7C89716D781847D3C59AB8349EC4B60 |
| Reporter | |
| Tags: | 7z GuLoader |
cocaman
Malicious email (T1566.001)From: "=?UTF-8?B?7J20IOyEse2biA==?=<info@bowlinggreen.net>" (likely spoofed)
Received: "from hp0.b.uixvn.club (hp0.b.uixvn.club [68.183.97.212]) "
Date: "26 Jul 2021 22:38:00 -0700"
Subject: "=?UTF-8?B?7IOY7ZSM7KCc7J6RIOuwnOyjvA==?="
Attachment: "RFQ-PO758596.7z"
Intelligence
File Origin
# of uploads :
1
# of downloads :
200
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Gathering data
Threat name:
Win32.Trojan.Mucc
Status:
Malicious
First seen:
2021-07-27 06:13:10 UTC
File Type:
Binary (Archive)
Extracted files:
7
AV detection:
8 of 46 (17.39%)
Threat level:
5/5
Detection(s):
Suspicious file
Result
Malware family:
guloader
Score:
10/10
Tags:
family:guloader downloader
Behaviour
Suspicious use of SetWindowsHookEx
Guloader,Cloudeye
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Legit
Score:
0.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.