MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 337471a86433031e87027a6459fee04e490ddfc016d4d7eab062e0a1e09ca138. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
GuLoader
Vendor detections: 3
| SHA256 hash: | 337471a86433031e87027a6459fee04e490ddfc016d4d7eab062e0a1e09ca138 |
|---|---|
| SHA3-384 hash: | 6953025aaef80c8b4965abb4999cacec55eed8c09dfd008de240fa43559c26f9208a912ba1fa1487705c8fe99ad906a5 |
| SHA1 hash: | b91e87456c7766a93376d5be584693d4fa0ad6f9 |
| MD5 hash: | 845b8e8b7d49cec7cb570f363780bb7f |
| humanhash: | steak-montana-one-lamp |
| File name: | PO 05272020.exe |
| Download: | download sample |
| Signature | GuLoader |
| File size: | 49'152 bytes |
| First seen: | 2020-05-29 06:22:34 UTC |
| Last seen: | 2020-05-29 11:11:05 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 1d6f9786cef5b86638d09b155a51e0e2 (1 x GuLoader) |
| ssdeep | 768:k5M8rk7fFkazprg+h6NBG7oQQvviokA5I/d04jH4:kMjNkatcu6NBxvjk9db4 |
| Threatray | 2'194 similar samples on MalwareBazaar |
| TLSH | 96234C77BE990022E74DC6B024529E6239377C661551AE3B5658A92C3D702C37CF33AF |
| Reporter | |
| Tags: | GuLoader |
Intelligence
File Origin
# of uploads :
4
# of downloads :
85
Origin country :
n/a
Vendor Threat Intelligence
Detection:
n/a
Gathering data
Threat name:
Win32.Trojan.Vbkrypt
Status:
Malicious
First seen:
2020-05-29 01:55:18 UTC
File Type:
PE (Exe)
Extracted files:
2
AV detection:
16 of 31 (51.61%)
Threat level:
5/5
Verdict:
malicious
Label(s):
lokipasswordstealer(pws)
guloader
Similar samples:
+ 2'184 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
5/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of NtSetInformationThreadHideFromDebugger
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.