MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 341f33c1103bf6340261fe146a5bded870d67a30e6a55ad9ef503fad17f33e60. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 341f33c1103bf6340261fe146a5bded870d67a30e6a55ad9ef503fad17f33e60
SHA3-384 hash: 9a9c9b5b3916538fb87782c150a6df8d5607a2bf23de13d6c59ac5c3c062acdddf90141fca1d3910c6c973ef32eb1e84
SHA1 hash: 55d8174aa4e440cf4fc02b83144138fd0ac8431b
MD5 hash: 4d9e6608c7140b33bdf732e5912a0743
humanhash: december-sad-connecticut-nebraska
File name:Order03092020_pdf.exe
Download: download sample
Signature GuLoader
File size:73'728 bytes
First seen:2020-09-03 04:38:26 UTC
Last seen:2020-09-03 12:39:02 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 450ef1487b146680a0993621676b8401 (2 x GuLoader)
ssdeep 768:b3ZHGXTvnH59hZtMFRyZsW/IEH6YLSQNy7S9EsYsHicxSNbDwMx5C9Z2QkOLY:FmXTvnuEDfTuS+sY58SDM98QK
Threatray 1 similar samples on MalwareBazaar
TLSH 6173C8199FCBA133E1AB29F21732815886EFFFF51470990F7240961BD7BA686871071E
Reporter cocaman
Tags:exe GuLoader

Intelligence


File Origin
# of uploads :
2
# of downloads :
244
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a UDP request
Creating a window
Result
Threat name:
GuLoader
Detection:
malicious
Classification:
rans.troj.evad
Score:
84 / 100
Signature
Antivirus / Scanner detection for submitted sample
Initial sample is a PE file and has a suspicious name
Multi AV Scanner detection for submitted file
Potential malicious icon found
Tries to detect virtualization through RDTSC time measurements
Yara detected GuLoader
Yara detected VB6 Downloader Generic
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Vebzenpak
Status:
Malicious
First seen:
2020-09-03 00:23:51 UTC
File Type:
PE (Exe)
Extracted files:
6
AV detection:
22 of 28 (78.57%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
guloader
Result
Malware family:
n/a
Score:
  4/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Modifies data under HKEY_USERS
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Drops file in Windows directory
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

GuLoader

Executable exe 341f33c1103bf6340261fe146a5bded870d67a30e6a55ad9ef503fad17f33e60

(this sample)

Comments