MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 21afff77ea0ce89dca2d925ed0d8b5a61f7ab42ca9aca78019843e9e251bbcb3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 21afff77ea0ce89dca2d925ed0d8b5a61f7ab42ca9aca78019843e9e251bbcb3
SHA3-384 hash: 71bbc94e6db1b13b7c5927cef468169a63b8ca743718c3205b642d8943741d0a7e92f8cb73948e9e699838fc3df76daa
SHA1 hash: a7838df5f7c9ff634e5f14f5214050ebfe83930f
MD5 hash: 88082512c0e181dad2f506893c40657b
humanhash: muppet-december-three-aspen
File name:i_Remittance.exe
Download: download sample
Signature GuLoader
File size:61'440 bytes
First seen:2020-12-03 17:41:32 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 277010f73b829299387a797a681d7e8c (3 x GuLoader)
ssdeep 384:2YlbXDIEvUNEqbBKV6HDlSAxrZ7haSeVnFEEfJkbCmCTQgogpkgQwX/P:2OzLYBMVqz74Z1FQ+mNd5U
Threatray 4'593 similar samples on MalwareBazaar
TLSH 38530A03F6438866E4C345B35F7397A841933D75AE426903A9A87A4DF932DC1BC6DB0B
Reporter abuse_ch
Tags:exe GuLoader


Avatar
abuse_ch
Malspam distributing GuLoader:

HELO: server.jayaproperty.com
Sending IP: 119.235.255.130
From: Vale <sales@horeco.com>
Subject: Payment Remittance Advice.
Attachment: i_Remittance.iso (contains "i_Remittance.exe")

GuLoader payload URL:
https://mindforcehypnosis.com/fas/decemberomo_FkoIc77.bin

Intelligence


File Origin
# of uploads :
1
# of downloads :
344
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Nanocore GuLoader
Detection:
malicious
Classification:
rans.troj.evad
Score:
100 / 100
Signature
Detected Nanocore Rat
Detected RDTSC dummy instruction sequence (likely for instruction hammering)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Potential malicious icon found
Sigma detected: NanoCore
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Uses dynamic DNS services
Writes to foreign memory regions
Yara detected GuLoader
Yara detected VB6 Downloader Generic
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 326593 Sample: i_Remittance.exe Startdate: 03/12/2020 Architecture: WINDOWS Score: 100 28 g.msn.com 2->28 44 Multi AV Scanner detection for domain / URL 2->44 46 Potential malicious icon found 2->46 48 Malicious sample detected (through community Yara rule) 2->48 50 6 other signatures 2->50 8 i_Remittance.exe 2->8         started        11 filename1.exe 2->11         started        13 filename1.exe 2->13         started        signatures3 process4 signatures5 52 Writes to foreign memory regions 8->52 54 Detected RDTSC dummy instruction sequence (likely for instruction hammering) 8->54 56 Tries to detect Any.run 8->56 58 Hides threads from debuggers 8->58 15 RegAsm.exe 1 21 8->15         started        20 RegAsm.exe 8->20         started        60 Tries to detect virtualization through RDTSC time measurements 11->60 process6 dnsIp7 30 decemberomo.duckdns.org 185.19.85.133, 49748, 6700 DATAWIRE-ASCH Switzerland 15->30 32 mindforcehypnosis.com 67.23.254.42, 443, 49747 DIMENOCUS United States 15->32 34 192.168.2.1 unknown unknown 15->34 24 C:\Users\user\subfolder1\filename1.exe, PE32 15->24 dropped 26 C:\Users\user\AppData\Roaming\...\run.dat, International 15->26 dropped 36 Tries to detect Any.run 15->36 38 Hides threads from debuggers 15->38 40 Hides that the sample has been downloaded from the Internet (zone.identifier) 15->40 22 conhost.exe 15->22         started        42 Tries to detect virtualization through RDTSC time measurements 20->42 file8 signatures9 process10
Threat name:
Win32.Trojan.Vebzenpak
Status:
Malicious
First seen:
2020-12-03 17:42:07 UTC
AV detection:
16 of 28 (57.14%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Unpacked files
SH256 hash:
21afff77ea0ce89dca2d925ed0d8b5a61f7ab42ca9aca78019843e9e251bbcb3
MD5 hash:
88082512c0e181dad2f506893c40657b
SHA1 hash:
a7838df5f7c9ff634e5f14f5214050ebfe83930f
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

GuLoader

Executable exe 21afff77ea0ce89dca2d925ed0d8b5a61f7ab42ca9aca78019843e9e251bbcb3

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments