MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2f35e754d4ed60b61a7621e22710426b1d1ade21cd31cb4b2d71a88b2a53decc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: 2f35e754d4ed60b61a7621e22710426b1d1ade21cd31cb4b2d71a88b2a53decc
SHA3-384 hash: 958738a28e3a7cf5422519453c3f025f285b01c46df5238b2cab22e9276fbfa16fe2be62bff549b662252fb8f4a9fed2
SHA1 hash: c927b37cdf09177f0767e363fe4ddfa72c799cc2
MD5 hash: 533bed61fa03c9306fd4db559ebc7dc2
humanhash: fish-pluto-mars-berlin
File name:Rechnung PDF.exe
Download: download sample
Signature GuLoader
File size:129'928 bytes
First seen:2022-09-20 07:47:07 UTC
Last seen:2022-09-23 05:26:58 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash b34f154ec913d2d2c435cbd644e91687 (527 x GuLoader, 110 x RemcosRAT, 80 x EpsilonStealer)
ssdeep 3072:oca/q6CDF6Lt3uPkbEAv/005FaFGAJCM3GUWo+SZTVJH63/ag:oQ606xNTv/00/V+CM3G3o+SZTLHY3
TLSH T1BBC3F100A3B1C597D8A257301E3227BBAF76D51435565F0B07607A1CBD63BC2D52E3AE
TrID 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
16.4% (.EXE) Win64 Executable (generic) (10523/12/4)
10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.0% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla)
Reporter adrian__luca
Tags:exe GuLoader signed

Code Signing Certificate

Organisation:Laft Staffage
Issuer:Laft Staffage
Algorithm:sha256WithRSAEncryption
Valid from:2022-09-05T16:38:21Z
Valid to:2025-09-04T16:38:21Z
Serial number: -08c1db7cb1e0265f
Thumbprint Algorithm:SHA256
Thumbprint: 39bebb739a5713021f9dc4e6c2d2776ec13d0fc62ebc7d6fb2db6c75f419cded
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
3
# of downloads :
528
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Creating a window
Creating a file in the %AppData% subdirectories
Creating a file in the %temp% subdirectories
Searching for the window
Searching for the Windows task manager window
Running batch commands
Creating a process with a hidden window
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
GuLoader
Detection:
malicious
Classification:
troj
Score:
60 / 100
Signature
Multi AV Scanner detection for submitted file
Obfuscated command line found
Yara detected GuLoader
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 706030 Sample: Rechnung PDF.exe Startdate: 20/09/2022 Architecture: WINDOWS Score: 60 35 Multi AV Scanner detection for submitted file 2->35 37 Yara detected GuLoader 2->37 39 Obfuscated command line found 2->39 7 Rechnung PDF.exe 3 91 2->7         started        process3 file4 33 C:\Users\user\AppData\Local\...\nsExec.dll, PE32 7->33 dropped 41 Obfuscated command line found 7->41 11 cmd.exe 1 7->11         started        13 cmd.exe 7->13         started        15 cmd.exe 7->15         started        17 71 other processes 7->17 signatures5 process6 process7 19 conhost.exe 11->19         started        21 conhost.exe 13->21         started        23 conhost.exe 15->23         started        25 conhost.exe 17->25         started        27 conhost.exe 17->27         started        29 conhost.exe 17->29         started        31 64 other processes 17->31
Threat name:
Win32.Trojan.Guloader
Status:
Malicious
First seen:
2022-09-16 12:37:43 UTC
File Type:
PE (Exe)
Extracted files:
6
AV detection:
15 of 40 (37.50%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
n/a
Score:
  7/10
Tags:
discovery
Behaviour
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Windows directory
Checks installed software on the system
Loads dropped DLL
Unpacked files
SH256 hash:
938580b466533dfa1461e9858fd106b60e1a52b713380915cc03afd3e4b4573c
MD5 hash:
98bdb37511634dad8d1236d91d373b26
SHA1 hash:
778cf74b4f8860cc378fa4e61aeba318197783ce
SH256 hash:
f7d98be26c813724c7cb673b53475fe660d3ef4f9930d57a550c91578c660e91
MD5 hash:
723646252e79cbb15c7817360f93a6d2
SHA1 hash:
c9ce61d71b7377456ab49c823fc756336b01f7b5
SH256 hash:
2f35e754d4ed60b61a7621e22710426b1d1ade21cd31cb4b2d71a88b2a53decc
MD5 hash:
533bed61fa03c9306fd4db559ebc7dc2
SHA1 hash:
c927b37cdf09177f0767e363fe4ddfa72c799cc2
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

GuLoader

Executable exe 2f35e754d4ed60b61a7621e22710426b1d1ade21cd31cb4b2d71a88b2a53decc

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments