MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1d3e8941eb686b154fca77b2c80b84a19fdf21ebd298dc55d4519310ed011add. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: 1d3e8941eb686b154fca77b2c80b84a19fdf21ebd298dc55d4519310ed011add
SHA3-384 hash: a2db9e46aa58f7dabfb4855134318b4c176b7976bcebd4e02535c05e002a8a96bb9e64ca2d203895c65c7c00cba7d70a
SHA1 hash: 13f2e9f206f444d64ae67ef8033e2c1379bfca65
MD5 hash: 96f30d3739dc506ab3bd8e4920710562
humanhash: black-oranges-floor-crazy
File name:Sipariş Metak_WJO-001,pdf.exe
Download: download sample
Signature GuLoader
File size:596'808 bytes
First seen:2022-08-09 06:17:53 UTC
Last seen:2022-08-09 06:30:07 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash b34f154ec913d2d2c435cbd644e91687 (527 x GuLoader, 110 x RemcosRAT, 80 x EpsilonStealer)
ssdeep 6144:l6bAcJOv+qlAcxp8XNbu0lTCzYQhb3VG+rmAYJDB5aRELc0UH3pKE+c0AzugkGjN:G+NniSb3VtrHSakzGKE+72jCMiA
Threatray 1'145 similar samples on MalwareBazaar
TLSH T12FC4AE4179B96ED3E57E03316CB7859212A8EC141672EB0B3192FE17B4B23532B1F29D
TrID 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
16.4% (.EXE) Win64 Executable (generic) (10523/12/4)
10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.0% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 31c88ca498d4d830 (3 x GuLoader)
Reporter TeamDreier
Tags:exe GuLoader signed

Code Signing Certificate

Organisation:repursuit Housekeeper
Issuer:repursuit Housekeeper
Algorithm:sha256WithRSAEncryption
Valid from:2022-08-08T03:37:32Z
Valid to:2025-08-07T03:37:32Z
Serial number: -1d69fd4614b7d64e
Thumbprint Algorithm:SHA256
Thumbprint: be0a243c7f954de4439af057adfac48e19f5bf517ef8ebae2429062e5c119acc
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
308
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Sipariş Metak_WJO-001,pdf.exe
Verdict:
Malicious activity
Analysis date:
2022-08-09 06:19:01 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Creating a window
Creating a file in the %AppData% subdirectories
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AgentTesla, GuLoader
Detection:
malicious
Classification:
troj.evad.spyw
Score:
84 / 100
Signature
Hides that the sample has been downloaded from the Internet (zone.identifier)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Yara detected AgentTesla
Yara detected GuLoader
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 680775 Sample: Sipari#U015f Metak_WJO-001,... Startdate: 09/08/2022 Architecture: WINDOWS Score: 84 34 mail.hotelsantaana.com.ec 2->34 36 hotelsantaana.com.ec 2->36 50 Yara detected GuLoader 2->50 52 Yara detected AgentTesla 2->52 54 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 2->54 8 Sipari#U015f Metak_WJO-001,pdf.exe 20 2->8         started        11 JfxetVa.exe 2 2->11         started        13 JfxetVa.exe 1 2->13         started        signatures3 process4 file5 28 C:\...\Microsoft.Office.Tools.Common.v9.0.dll, PE32 8->28 dropped 30 C:\Users\user\...\FanControlWrapper.dll, PE32+ 8->30 dropped 32 C:\Users\user\AppData\Local\...\System.dll, PE32 8->32 dropped 15 CasPol.exe 2 13 8->15         started        20 conhost.exe 11->20         started        22 conhost.exe 13->22         started        process6 dnsIp7 38 hotelsantaana.com.ec 205.134.255.242, 49796, 587 IMH-WESTUS United States 15->38 40 141.98.6.239, 49795, 80 CMCSUS Germany 15->40 26 C:\Users\user\AppData\Roaming\...\JfxetVa.exe, PE32 15->26 dropped 42 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 15->42 44 Tries to steal Mail credentials (via file / registry access) 15->44 46 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 15->46 48 3 other signatures 15->48 24 conhost.exe 15->24         started        file8 signatures9 process10
Threat name:
Win32.Trojan.Tedy
Status:
Malicious
First seen:
2022-08-09 06:18:18 UTC
File Type:
PE (Exe)
Extracted files:
22
AV detection:
8 of 40 (20.00%)
Threat level:
  5/5
Result
Malware family:
guloader
Score:
  10/10
Tags:
family:guloader downloader
Behaviour
Enumerates physical storage devices
Loads dropped DLL
Guloader,Cloudeye
Unpacked files
SH256 hash:
f004c568d305cd95edbd704166fcd2849d395b595dff814bcc2012693527ac37
MD5 hash:
8b3830b9dbf87f84ddd3b26645fed3a0
SHA1 hash:
223bef1f19e644a610a0877d01eadc9e28299509
SH256 hash:
1d3e8941eb686b154fca77b2c80b84a19fdf21ebd298dc55d4519310ed011add
MD5 hash:
96f30d3739dc506ab3bd8e4920710562
SHA1 hash:
13f2e9f206f444d64ae67ef8033e2c1379bfca65
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

GuLoader

Executable exe 1d3e8941eb686b154fca77b2c80b84a19fdf21ebd298dc55d4519310ed011add

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments