MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 17c85a64041b0a442cebc9dacd04fb0742ff04939ba716f996f532ff0ff9e592. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 11


Intelligence 11 IOCs YARA 2 File information Comments

SHA256 hash: 17c85a64041b0a442cebc9dacd04fb0742ff04939ba716f996f532ff0ff9e592
SHA3-384 hash: b41dee60bcbecf8b81eb108f237db20adbc3a22e3328b75e87250171455ab7b9e9841a5bb49bfb8150518f087e5b24da
SHA1 hash: 013e4dfe8891b618849827528247ab1f34582141
MD5 hash: dd6e4657be4dc07e8ceabe348c3d2c68
humanhash: pizza-triple-wolfram-dakota
File name:B46757777577574567744Kontantrabatterne.vbs
Download: download sample
Signature GuLoader
File size:53'648 bytes
First seen:2025-10-20 12:08:41 UTC
Last seen:Never
File type:Visual Basic Script (vbs) vbs
MIME type:text/plain
ssdeep 768:yMl0bxVOUEHVpC1l4WQddkG0HRF41/dm02E7VoJLRdRI64EGq4XoNQB+qfPu:y00bx1f1lpQEG0H7Y/Ro4EGHXo6B+cPu
Threatray 2'104 similar samples on MalwareBazaar
TLSH T14833F7E9FD1842194D4B77FEFD06C5A086E88D12461E41E0FED9EA1CD30A668E7FC14A
Magika vba
Reporter Anonymous
Tags:GuLoader vbs

Intelligence


File Origin
# of uploads :
1
# of downloads :
133
Origin country :
PL PL
Vendor Threat Intelligence
Verdict:
Malicious
Score:
92.5%
Tags:
xtreme shell sage
Verdict:
Malicious
File Type:
vbs
First seen:
2025-10-20T04:32:00Z UTC
Last seen:
2025-10-22T10:09:00Z UTC
Hits:
~1000
Detections:
Trojan.JS.SAgent.sb HEUR:Trojan.VBS.SAgent.gen HEUR:Trojan.Script.Generic
Verdict:
inconclusive
YARA:
1 match(es)
Threat name:
Script-WScript.Trojan.Znyonm
Status:
Malicious
First seen:
2025-10-20 12:09:31 UTC
File Type:
Text (VBS)
AV detection:
10 of 38 (26.32%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Modifies registry class
Badlisted process makes network request
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:detect_tiny_vbs
Author:daniyyell
Description:Detects tiny VBS delivery technique
Rule name:Guloader_VBScript
Author:Ankit Anubhav - ankitanubhav.info
Description:Detects GuLoader/CloudEye VBScripts

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments