MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 242e753a150db24e2f8a7787e97e26880806ec11f822eb388867b7703dd2de9f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 242e753a150db24e2f8a7787e97e26880806ec11f822eb388867b7703dd2de9f
SHA3-384 hash: 3bcb34d15a7e76486a8344130f097fca61fbd017375630965692d71ba823a57aa074364cf647f486996ef3da48074051
SHA1 hash: bffe2a3ab7b5ae55dc869784b602bb50bbe12f51
MD5 hash: 697ade1df9d97099efa52772726e73d5
humanhash: october-juliet-wyoming-massachusetts
File name:COJHJHHGHVCDKNJKJ.exe
Download: download sample
Signature GuLoader
File size:114'688 bytes
First seen:2020-05-11 15:37:22 UTC
Last seen:2020-05-11 17:09:17 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f2849ea3b18f409799743aa551737b20 (1 x GuLoader)
ssdeep 1536:hUwddn6zIlau8MvX/DJm0FijxOMr2rS78xSBAgljPOwcAdsDd9Rl79DdCI7Uz:Vddn6mau8WVvRPha
Threatray 94 similar samples on MalwareBazaar
TLSH 89B3F70522D4A117D6FE8DF2578272C9D2ADAD3E7405371B27C2338EE73A841A6D137A
Reporter abuse_ch
Tags:exe GuLoader Loki


Avatar
abuse_ch
Malspam distributing GuLoader:

HELO: p3plsmtpa09-02.prod.phx3.secureserver.net
Sending IP: 173.201.193.231
From: Cuentas <compras@pharmasi.com.mx>
Subject: Pago
Attachment: Pago.xls

Malspam distributing GuLoader->Loki

XLS->GuLoader->Loki

GuLoader payload URL:
https://nilemixitupd.biz.pl/SILVER/COJHJHHGHVCDKNJKJ.exe

Loki payload URL:
https://protestlabsmovings.es/trilp/build_QaDIysPvgb173.bin

Loki C2:
http://157.52.211.247/arinate/Panel/five/fre.php

Intelligence


File Origin
# of uploads :
2
# of downloads :
89
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Injector
Status:
Malicious
First seen:
2020-05-11 16:38:03 UTC
AV detection:
25 of 31 (80.65%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of NtSetInformationThreadHideFromDebugger
Checks QEMU agent state file
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

GuLoader

Executable exe 242e753a150db24e2f8a7787e97e26880806ec11f822eb388867b7703dd2de9f

(this sample)

  
Dropping
Loki
  
Delivery method
Distributed via web download

Comments