MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 17f52dbf63e20cb471e6da579551830186446d814a14162ec3569c62fb6f0771. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 17f52dbf63e20cb471e6da579551830186446d814a14162ec3569c62fb6f0771
SHA3-384 hash: fdd5700e6c45992a038f7c7c8d0a8db5cfd86ec8cf10ed0803396831a71107ce6ae65c58c365987694412870c2ca59e8
SHA1 hash: 4e14f148c44d2afa65170500bae38456aeea6dc5
MD5 hash: fe1c36e91d10b9362bb6ccd908cd4179
humanhash: floor-helium-fix-michigan
File name:Purchase Order.exe
Download: download sample
Signature GuLoader
File size:110'592 bytes
First seen:2020-06-03 13:32:22 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 1cc5e4409f9ce2ba12b08f9a89c6a2f8 (8 x GuLoader)
ssdeep 1536:ISPfxV40l9TeyzyXXIoYeqkxfkgrKHxLdGKc+o0FDHdZ1gIV7H07rbmF1+I4FC:RPXlBeXXIoYeDKVdhjFD9zh+XbFC
Threatray 1'127 similar samples on MalwareBazaar
TLSH 23B37B13ED4D8A53D1144BBE2D174EB97B1EAD1C0C405BEF64367E9B6E312422DAB20E
Reporter abuse_ch
Tags:exe GuLoader


Avatar
abuse_ch
Malspam distributing GuLoader:

HELO: teyseer-services.com
Sending IP: 104.168.141.201
From: Khadirulla Shariff <khadirulla.shariff@teyseer-services.com>
Reply-To: Khadirulla Shariff <khadirulla.shariff@teyseer-services.com>
Subject: Purchase Order
Attachment: Purchase Order.img (contains "Purchase Order.exe")

GuLoader payload URL:
http://192.119.64.226/ccv.bin

Intelligence


File Origin
# of uploads :
1
# of downloads :
71
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Injector
Status:
Malicious
First seen:
2020-06-03 10:36:32 UTC
AV detection:
20 of 31 (64.52%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  6/10
Tags:
persistence
Behaviour
Suspicious behavior: MapViewOfSection
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Adds Run key to start application
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

GuLoader

Executable exe 17f52dbf63e20cb471e6da579551830186446d814a14162ec3569c62fb6f0771

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments