MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 37d08a64868c35c5bae8f5155cc669486590951ea80dd9da61ec38defb89a146. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 37d08a64868c35c5bae8f5155cc669486590951ea80dd9da61ec38defb89a146
SHA3-384 hash: 20be0be21cfad81c53fb0977909e30471ce5cbcc2e7beaa2a3d6a433863bbb8b7ef03570d5813387d41f541c53a6af02
SHA1 hash: 30e33139b101282727f5ba9182d1d856ac96ec6a
MD5 hash: b5a07242409d812c007e3dadb859fedc
humanhash: whiskey-arkansas-table-zebra
File name:b5a07242409d812c007e3dadb859fedc.exe
Download: download sample
Signature GuLoader
File size:87'736 bytes
First seen:2021-05-20 18:29:41 UTC
Last seen:2021-05-20 19:31:17 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 460f9cd83bcc5d612a8fc7838b465d4e (2 x GuLoader)
ssdeep 768:0jHb2YNl7XEFFLj19Azb6CdXyCS2xplRlNZ08nYKmgkWmfz/EhGW4jMALnATPcyF:AqWiFFd9E5yCPRV08nYnATPcyF
Threatray 5'136 similar samples on MalwareBazaar
TLSH EE835B32B474D6B2F9E145B05768495C0E5B2C3F0F6D8DC73049251C97B2BC2AB623EA
Reporter abuse_ch
Tags:exe GuLoader


Avatar
abuse_ch
GuLoader payload URL:
http://hshjiopklmsacnzbcjuewahfdsnvmlazbcuewqjh.ydns.eu/MEKI%20NEW_rGDXhItdtA168.bin

Intelligence


File Origin
# of uploads :
2
# of downloads :
157
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Packed.Generic
Status:
Suspicious
First seen:
2021-05-20 15:06:33 UTC
AV detection:
16 of 47 (34.04%)
Threat level:
  1/5
Result
Malware family:
guloader
Score:
  10/10
Tags:
family:guloader downloader
Behaviour
Suspicious use of SetWindowsHookEx
Guloader,Cloudeye
Malware Config
C2 Extraction:
http://hshjiopklmsacnzbcjuewahfdsnvmlazbcuewqjh.ydns.eu/MEKI%20NEW_rGDXhItdtA168.bin
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

GuLoader

Executable exe 37d08a64868c35c5bae8f5155cc669486590951ea80dd9da61ec38defb89a146

(this sample)

  
Delivery method
Distributed via web download

Comments