MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 17febcec21b3156aec42aea1f3b70e45b0ea57572547b483aeb1614a6d5a4d89. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 17febcec21b3156aec42aea1f3b70e45b0ea57572547b483aeb1614a6d5a4d89
SHA3-384 hash: 9cbc7e5e17ec1333ca5bc83d1c0f7c2bee86d760b6795282ad3f3c85b825eca103c5790bc8939b45162de79fb5ede7b1
SHA1 hash: 8bfbe93710b3d4a60be0b9934df6af13b621b6a2
MD5 hash: 4d81da5ef603053c7ea3b654bc0dc0db
humanhash: glucose-pennsylvania-avocado-sink
File name:PO - P1051445.exe
Download: download sample
Signature GuLoader
File size:110'592 bytes
First seen:2021-05-14 09:37:05 UTC
Last seen:2021-05-14 10:37:07 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash d00adabc9f3bc94da628c8821eed2121 (2 x GuLoader)
ssdeep 768:DeOoiUHchgMJ2esfiRtDZu2cAaiBnmd9mIlwL6oHQWQZxZuopfjwJjBRqVqBdzcc:aDibdUi3MQns9ZGH4ZxZxprajB0VU1t
Threatray 1'577 similar samples on MalwareBazaar
TLSH B4B35B71D6AC5052C259C930D8B65A7D6A29BE301592DF0B6B083F9F39F0F02E5E960F
Reporter Anonymous
Tags:GuLoader

Intelligence


File Origin
# of uploads :
2
# of downloads :
184
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
PO - P1051445.exe
Verdict:
No threats detected
Analysis date:
2021-05-14 09:37:57 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
DNS request
Creating a window
Sending a UDP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Gathering data
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
56 / 100
Signature
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Found potential dummy code loops (likely to delay analysis)
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
Win32.Worm.Wbvb
Status:
Malicious
First seen:
2021-05-14 01:32:21 UTC
AV detection:
4 of 47 (8.51%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments