MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2ace558d202e365fac33752bc28b1c60b07e90904c9f0f4492d13d67f3277530. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 2ace558d202e365fac33752bc28b1c60b07e90904c9f0f4492d13d67f3277530
SHA3-384 hash: 39a98d078f227ef34cc07aecbb211fcc507cbaf47852a66a4c72d5523db8434ac3885fec2cabaacbc0251dfcbd1289f2
SHA1 hash: c131b26196171709182d32ead6d8bc983edea9f8
MD5 hash: f6fe39b2b6a77d54f67c50e9accb8296
humanhash: hawaii-white-green-mexico
File name:DOCUSI~2.SCR
Download: download sample
Signature GuLoader
File size:81'920 bytes
First seen:2020-05-01 15:54:30 UTC
Last seen:2020-05-01 15:55:37 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 167147fcdab6714b5f29d97d4d4650a4 (1 x GuLoader)
ssdeep 768:MveU4aN7pBlExd08aVZxL5NzEptSmWO6YmyQeygD:xU4aNNzEHGN5NzutoihyE
Threatray 126 similar samples on MalwareBazaar
TLSH A3834B16F9D4E573D580CAB24F3A96E0687BBC304D458D237A5C3B2EDA79E06E480357
Reporter cocaman
Tags:GuLoader scr

Intelligence


File Origin
# of uploads :
2
# of downloads :
91
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2020-05-01 16:35:31 UTC
File Type:
PE (Exe)
Extracted files:
6
AV detection:
23 of 31 (74.19%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

GuLoader

Executable exe 2ace558d202e365fac33752bc28b1c60b07e90904c9f0f4492d13d67f3277530

(this sample)

  
Delivery method
Other

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
VB_APILegacy Visual Basic API usedMSVBVM60.DLL::__vbaObjSetAddref
MSVBVM60.DLL::EVENT_SINK_AddRef
MSVBVM60.DLL::__vbaLateMemCallLd

Comments