MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 26c22b4054e91bf9d7b89ae538496d9b728486ae6b337ca31dd01f3200d7d7f8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
GuLoader
Vendor detections: 3
| SHA256 hash: | 26c22b4054e91bf9d7b89ae538496d9b728486ae6b337ca31dd01f3200d7d7f8 |
|---|---|
| SHA3-384 hash: | e013372f8997f7ad396470a7c68b95dbe99946a036961edd3ae8cbf92c2052220d55f7984f3d941e4ce2df07753442b0 |
| SHA1 hash: | 04e65c1baf1504c1a40f8a499a3c7efe352a25f7 |
| MD5 hash: | 946da70a1f871463a031c3aaa29f09c3 |
| humanhash: | spaghetti-nebraska-happy-blue |
| File name: | order.exe |
| Download: | download sample |
| Signature | GuLoader |
| File size: | 114'688 bytes |
| First seen: | 2020-05-27 17:28:32 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | d5059c10bddded55264c32e40b5648c4 (1 x GuLoader) |
| ssdeep | 768:1qfD+zyGtzH1wifFI45VXDXOKiGE2z4QJ32afuYdf19MnTJgCJPjJdawreAX:wD+mGVH13fb59OpGE2z4o3DF8n6CJG+ |
| Threatray | 196 similar samples on MalwareBazaar |
| TLSH | 3BB3E923BAE09CB1D8608FB20D7186991D36FD6C6B200F1B7548BB5E3D361CF259076A |
| Reporter | |
| Tags: | exe GuLoader |
abuse_ch
Malspam distributing GuLoader:HELO: fran.com
Sending IP: 83.166.245.173
From: RINNO\ <RINNO <andy8645@naver.com>
Reply-To: andy8645@naver.com
Subject: Request for Quotation - V-40795
Attachment: Drawing_RFQ_V40795.img (contains "order.exe")
GuLoader payload URL:
http://185.94.191.88/bin_qNQJqzF250.bin
Intelligence
File Origin
# of uploads :
1
# of downloads :
73
Origin country :
n/a
Vendor Threat Intelligence
Detection:
n/a
Gathering data
Threat name:
Win32.Trojan.Injector
Status:
Malicious
First seen:
2020-05-27 20:00:31 UTC
AV detection:
23 of 31 (74.19%)
Threat level:
2/5
Verdict:
malicious
Label(s):
guloader
Similar samples:
+ 186 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
5/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of NtSetInformationThreadHideFromDebugger
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.