MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1c7aee0fc8ced2b774aa4a05c4a00228dddb3c9768afa1f8309f8e188431836d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 1c7aee0fc8ced2b774aa4a05c4a00228dddb3c9768afa1f8309f8e188431836d
SHA3-384 hash: 650a1f7ae6f45a52e29cee803e870f6c2f4dd66c5096c1eb5270f66208ae4b19d40315e56feb56cd9dd0a8bb3fb1a2a6
SHA1 hash: a0b715c6d3ea3fc5047d741e868643e7ad135de3
MD5 hash: ccf85d80bf9de861ae1deb60e7bd6294
humanhash: two-three-diet-illinois
File name:Covid-19 (specification sheets).bat
Download: download sample
Signature GuLoader
File size:106'496 bytes
First seen:2020-04-13 17:40:25 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 7c1cf13cd96bdedda51e19dbdd72f948 (1 x GuLoader)
ssdeep 768:NUsIhroIhuT3UJ98ZyLMCvGAevSJvZ8W/7n4sT2CYC1OqeFqjw:NNbYyp4LMC+9vSJGWjn4siCBOqm
Threatray 953 similar samples on MalwareBazaar
TLSH F3A3E712B584FD94D9664BB28E77C6981A21BC34EC017B0731D87F6F39B66D07813B8A
Reporter abuse_ch
Tags:COVID-19 exe GuLoader


Avatar
abuse_ch
COVID-19 themed malspam distributing GuLoader->AgenTesla:

HELO: srv3.hostingafull.com
Sending IP: 198.46.134.157
From: tamas.szuts@propharma.hu
Subject: COVID-19(Coronavirus)products
Attachment: Covid-19 specification sheets.arj (contains "Covid-19 specification sheets.bat")

GuLoader payload URL (AgentTesla):
https://drive.google.com/uc?export=download&id=1cnKgO1WC_XGRP2u0VspZs1LTWO_DvI_U

Intelligence


File Origin
# of uploads :
1
# of downloads :
102
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Minix
Status:
Malicious
First seen:
2020-04-13 18:35:25 UTC
File Type:
PE (Exe)
Extracted files:
6
AV detection:
25 of 31 (80.65%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

GuLoader

Executable exe 1c7aee0fc8ced2b774aa4a05c4a00228dddb3c9768afa1f8309f8e188431836d

(this sample)

  
Dropping
AgentTesla
  
Delivery method
Distributed via e-mail attachment

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
VB_APILegacy Visual Basic API usedMSVBVM60.DLL::EVENT_SINK_AddRef

Comments