MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 253b92053e006314eb4999d0c399fea214273978dd0cd4ff012335116fe9d6fa. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 253b92053e006314eb4999d0c399fea214273978dd0cd4ff012335116fe9d6fa
SHA3-384 hash: eccc6535f2ff14f5bdd9aa6e28351f992e3ca4d50ab8ba5bca8ed7ac883946beb45ba35e157070ab5e15e66c1403d1e9
SHA1 hash: be4b8ce92b49ccc860954af61272f9b5b6e10c08
MD5 hash: f993152a5a5614b45b3459f336b837a0
humanhash: saturn-victor-mexico-paris
File name:COMPANY DETAILED INFORMATION.exe
Download: download sample
Signature GuLoader
File size:94'208 bytes
First seen:2020-06-02 11:16:27 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash ba3af5a58331da1d924015f8106fa5be (7 x GuLoader)
ssdeep 1536:L3FO8lLs49+vBzblKLzwKkwP3iiivfvFmdR60:qi+v9l8zwDEm4l
Threatray 1'030 similar samples on MalwareBazaar
TLSH 6F9307137AD49902F1B24B716EBB82996B25FC194D439A0F354D2A4B7B307629C6C33F
Reporter abuse_ch
Tags:exe GuLoader


Avatar
abuse_ch
Malspam distributing GuLoader:

HELO: bre.r1host.com
Sending IP: 136.243.102.137
From: b.sakhipour@bre-line.ro <b.sakhipour@bre-line.com>
Subject: Re: Comandă de cumpărare HDDT/MSK929832020
Attachment: Comandă de cumpărare HDDTMSK929832020.rar (contains "COMPANY DETAILED INFORMATION.exe")

GuLoader payload URL:
http://ratamodu.ga/~zadmin/group/frega_SEyLI167.bin

Intelligence


File Origin
# of uploads :
1
# of downloads :
68
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Injector
Status:
Malicious
First seen:
2020-06-02 11:43:14 UTC
AV detection:
12 of 31 (38.71%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
Suspicious behavior: MapViewOfSection
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

f644614442f0b05ee845d65e3f9d3e3d

GuLoader

Executable exe 253b92053e006314eb4999d0c399fea214273978dd0cd4ff012335116fe9d6fa

(this sample)

  
Dropped by
MD5 f644614442f0b05ee845d65e3f9d3e3d
  
Delivery method
Distributed via e-mail attachment

Comments