MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 25368f648491ac3483fd20c5cbef764cb920e0cab6fa287bb57cda03d70681d5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 12


Intelligence 12 IOCs YARA 37 File information Comments 1

SHA256 hash: 25368f648491ac3483fd20c5cbef764cb920e0cab6fa287bb57cda03d70681d5
SHA3-384 hash: c5864d2ef1ee5e982d83045a5a46dc3899d4193a0887e466e10093a1be1b87aa0874653477eff31690415f26c51b8041
SHA1 hash: 8c3a5179cc8b5be93e69501b2299d5983a7b7b9a
MD5 hash: 2c51b09ee454b3a3a7d40db7421dcac9
humanhash: lake-maryland-paris-muppet
File name:BraveCrashHandler64.exe
Download: download sample
Signature GuLoader
File size:10'413'056 bytes
First seen:2023-11-28 15:07:59 UTC
Last seen:2023-11-28 16:19:26 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 5e5ac8ab7be27ac2d1c548e5589378b6 (11 x GuLoader, 6 x Stealc, 5 x RedLineStealer)
ssdeep 196608:vA12R/2byviwCNL4D/fhoaYLbJ2MZ8KQE6GJBrZELRFiYUWU8mLOxdk:v/vXLD/fhzyUoJ1mLbUxR
TLSH T1C6A63367857A8CA1D863A83F7FE07BF20663686E807797507365108AB632B05745FE3C
TrID 34.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
23.4% (.EXE) Win32 Executable (generic) (4505/5/1)
10.7% (.EXE) Win16/32 Executable Delphi generic (2072/23)
10.5% (.EXE) OS/2 Executable (generic) (2029/13)
10.4% (.EXE) Generic Win/DOS Executable (2002/3)
Reporter Xev
Tags:CoinMiner exe GuLoader

Intelligence


File Origin
# of uploads :
2
# of downloads :
307
Origin country :
GR GR
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a file in the %temp% directory
Searching for analyzing tools
Enabling the 'hidden' option for files in the %temp% directory
Running batch commands
Creating a process with a hidden window
Launching a process
Using the Windows Management Instrumentation requests
Searching for synchronization primitives
Sending a custom TCP request
Creating a process from a recently created file
DNS request
Creating a window
Sending a UDP request
Gathering data
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
guloader lolbin packed shell32
Result
Verdict:
MALICIOUS
Result
Threat name:
n/a
Detection:
malicious
Classification:
evad
Score:
88 / 100
Signature
Antivirus / Scanner detection for submitted sample
Detected unpacking (changes PE section rights)
Hides threads from debuggers
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has nameless sections
Tries to detect sandboxes and other dynamic analysis tools (window names)
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Guloader
Status:
Malicious
First seen:
2023-11-26 14:50:53 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
20 of 23 (86.96%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Delays execution with timeout.exe
Enumerates processes with tasklist
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious use of NtSetInformationThreadHideFromDebugger
Looks up external IP address via web service
Executes dropped EXE
Loads dropped DLL
Unpacked files
SH256 hash:
95008989634074dfb33abbb3dea4681bc5f95a25844197fcba0bd0a18af9d187
MD5 hash:
15431ce36be48170c506ea2231f33f8e
SHA1 hash:
86f09b453946361e3301e2fa0b3ed4e81d48326b
SH256 hash:
25368f648491ac3483fd20c5cbef764cb920e0cab6fa287bb57cda03d70681d5
MD5 hash:
2c51b09ee454b3a3a7d40db7421dcac9
SHA1 hash:
8c3a5179cc8b5be93e69501b2299d5983a7b7b9a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Borland
Author:malware-lu
Rule name:command_and_control
Author:CD_R0M_
Description:This rule searches for common strings found by malware using C2. Based on a sample used by a Ransomware group
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__RemoteAPI
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__ConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerHiding__Thread
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:EnigmaStub
Author:@bartblaze
Description:Identifies Enigma packer stub.
Rule name:GoBinTest
Rule name:golang
Rule name:golang_binary_string
Description:Golang strings present
Rule name:golang_duffcopy_amd64
Rule name:identity_golang
Author:Eric Yocam
Description:find Golang malware
Rule name:maldoc_getEIP_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:NET
Author:malware-lu
Rule name:pe_no_import_table
Description:Detect pe file that no import table
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits
Rule name:RC6_Constants
Author:chort (@chort0)
Description:Look for RC6 magic constants in binary
Reference:https://twitter.com/mikko/status/417620511397400576
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:SHA512_Constants
Author:phoul (@phoul)
Description:Look for SHA384/SHA512 constants
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

GuLoader

Executable exe 25368f648491ac3483fd20c5cbef764cb920e0cab6fa287bb57cda03d70681d5

(this sample)

Comments



Avatar
commented on 2023-11-28 15:08:11 UTC

https://s3.us-east-1.amazonaws.com/010ad332/BraveCrashHandler64.exe