MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 338ee076a3641ab7a652189d830ee26334743a6b1c66925d12d54b755a2421b9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 338ee076a3641ab7a652189d830ee26334743a6b1c66925d12d54b755a2421b9
SHA3-384 hash: aef5ac6ffcf7e4544bb4104b70e621bfbb684dbe73ef4d8bd884e74414f0005654a3859905d0a18f995594c2c8be474e
SHA1 hash: 5cf38889c804881d338f69244c0a2d9844e68d52
MD5 hash: 1af50d1592ef3c604997cddfe6d6e6c8
humanhash: failed-louisiana-one-carbon
File name:Offerteaanvraag 14-02-2022.exe
Download: download sample
Signature GuLoader
File size:458'384 bytes
First seen:2022-02-14 16:18:14 UTC
Last seen:2022-02-14 17:36:08 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 56a78d55f3f7af51443e58e0ce2fb5f6 (720 x GuLoader, 451 x Formbook, 295 x Loki)
ssdeep 6144:ObE/HUsqaHjErV0UjVrH76Brup88h8h+843ggbxfNSXNISJSdIX3b4Ff:ObwqprVDjVrH7pv1bxfUdIOCc4Ff
Threatray 9'249 similar samples on MalwareBazaar
TLSH T178A4CF2D073CC856F0A02DFC6822DBB97EFC5F21621DB96753202CD758F12939A8A197
File icon (PE):PE icon
dhash icon 1998b0b69ee6fc08 (3 x Loki, 1 x GuLoader)
Reporter abuse_ch
Tags:exe geo GuLoader NLD signed

Code Signing Certificate

Organisation:balancerstnger
Issuer:balancerstnger
Algorithm:sha256WithRSAEncryption
Valid from:2022-02-14T07:05:45Z
Valid to:2023-02-14T07:05:45Z
Serial number: 00
Intelligence: 325 malware samples on MalwareBazaar are signed with this code signing certificate
Cert Central Blocklist:This certificate is on the Cert Central blocklist
Thumbprint Algorithm:SHA256
Thumbprint: 701a8b03ac7224bb7ec816d984abcbbd8525c29c031c34f2874a23dcd7275437
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
300
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Creating a window
Creating a file in the %temp% subdirectories
Creating a file
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
control.exe overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
GuLoader
Detection:
malicious
Classification:
troj.evad
Score:
80 / 100
Signature
C2 URLs / IPs found in malware configuration
Found malware configuration
Hides threads from debuggers
Multi AV Scanner detection for submitted file
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected GuLoader
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.GenCBL
Status:
Malicious
First seen:
2022-02-14 16:19:12 UTC
File Type:
PE (Exe)
Extracted files:
40
AV detection:
17 of 27 (62.96%)
Threat level:
  5/5
Result
Malware family:
guloader
Score:
  10/10
Tags:
family:guloader downloader
Behaviour
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Windows directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Legitimate hosting services abused for malware hosting/C2
Checks QEMU agent file
Loads dropped DLL
Guloader,Cloudeye
Unpacked files
SH256 hash:
338ee076a3641ab7a652189d830ee26334743a6b1c66925d12d54b755a2421b9
MD5 hash:
1af50d1592ef3c604997cddfe6d6e6c8
SHA1 hash:
5cf38889c804881d338f69244c0a2d9844e68d52
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments