MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 39f1703e13bdc112f4ffe9240f70cd5eb5b07cc218e6b22a8d58e4dcfaadd0a1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 17


Intelligence 17 IOCs YARA 6 File information Comments

SHA256 hash: 39f1703e13bdc112f4ffe9240f70cd5eb5b07cc218e6b22a8d58e4dcfaadd0a1
SHA3-384 hash: 98bf47071e0337dbe041f47bf418de1404baf03de08f0d4a0a878b78f08d89a69ce6b27e071f25d884b7529186f2a4a5
SHA1 hash: e03a3385bc0cd5869c2a8cc72c80f4115b7b7945
MD5 hash: 61bdbe7854f1572202f7916cf7f03616
humanhash: xray-colorado-texas-snake
File name:39f1703e13bdc112f4ffe9240f70cd5eb5b07cc218e6b22a8d58e4dcfaadd0a1
Download: download sample
Signature GuLoader
File size:469'904 bytes
First seen:2024-09-02 14:16:00 UTC
Last seen:2024-09-02 15:33:01 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash b78ecf47c0a3e24a6f4af114e2d1f5de (295 x GuLoader, 23 x Formbook, 21 x RemcosRAT)
ssdeep 12288:rKYi/LYz3kRV6h/3lObHOjeP/AxozXkYD:GFDg3ZhvlwHWiYx2UYD
Threatray 838 similar samples on MalwareBazaar
TLSH T124A4025627D640D6F87946F1442356269363B92F18A18A8FFE5CB6FB2C74303C41FA2B
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
File icon (PE):PE icon
dhash icon fcf4dcdcdcd8d9f0 (1 x Loki, 1 x GuLoader)
Reporter adrian__luca
Tags:exe GuLoader signed

Code Signing Certificate

Organisation:Overophedendes
Issuer:Overophedendes
Algorithm:sha256WithRSAEncryption
Valid from:2023-12-18T08:04:43Z
Valid to:2026-12-17T08:04:43Z
Serial number: 1bf58d5c0752b2550c09722cffd93c395b90ede2
Thumbprint Algorithm:SHA256
Thumbprint: 9c43b3018a2cb0a9fcdc9b9851216d5e764e08b107f4c225c14e7875639b2f50
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
415
Origin country :
HU HU
Vendor Threat Intelligence
Malware family:
guloader
ID:
1
File name:
39f1703e13bdc112f4ffe9240f70cd5eb5b07cc218e6b22a8d58e4dcfaadd0a1
Verdict:
Malicious activity
Analysis date:
2024-09-02 14:21:43 UTC
Tags:
guloader loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.1%
Tags:
Encryption Execution Static Malware
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Creating a window
Creating a file in the %temp% subdirectories
Creating a file
Searching for the window
Searching for the Windows task manager window
Launching a process
Using the Windows Management Instrumentation requests
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Detected Remcos RAT
Disables UAC (registry)
Drops PE files with a suspicious file extension
Found malware configuration
Found suspicious powershell code related to unpacking or dynamic code loading
Installs a global keyboard hook
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Powershell drops PE file
Sigma detected: Remcos
Sigma detected: Suspicious Script Execution From Temp Folder
Suspicious powershell command line found
Uses cmd line tools excessively to alter registry or file data
Uses dynamic DNS services
Yara detected Remcos RAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1502984 Sample: anziOUzZJs.exe Startdate: 02/09/2024 Architecture: WINDOWS Score: 100 53 a458386d9.duckdns.org 2->53 55 drive.usercontent.google.com 2->55 57 drive.google.com 2->57 69 Found malware configuration 2->69 71 Multi AV Scanner detection for dropped file 2->71 73 Multi AV Scanner detection for submitted file 2->73 77 5 other signatures 2->77 9 anziOUzZJs.exe 32 2->9         started        13 svchost.exe 1 1 2->13         started        signatures3 75 Uses dynamic DNS services 53->75 process4 dnsIp5 43 C:\Users\user\AppData\Local\...\BgImage.dll, PE32 9->43 dropped 45 C:\Users\user\AppData\Local\...\nsExec.dll, PE32 9->45 dropped 47 C:\Users\user\AppData\Local\...\nsDialogs.dll, PE32 9->47 dropped 81 Suspicious powershell command line found 9->81 16 powershell.exe 5 29 9->16         started        59 127.0.0.1 unknown unknown 13->59 file6 signatures7 process8 dnsIp9 49 drive.usercontent.google.com 142.250.181.225, 443, 49729 GOOGLEUS United States 16->49 51 drive.google.com 142.250.184.238, 443, 49726 GOOGLEUS United States 16->51 39 C:\Users\user\AppData\...\Partivarerne.scr, PE32 16->39 dropped 41 C:\ProgramData\remcos\logs.dat, data 16->41 dropped 61 Detected Remcos RAT 16->61 63 Drops PE files with a suspicious file extension 16->63 65 Found suspicious powershell code related to unpacking or dynamic code loading 16->65 67 2 other signatures 16->67 21 cmd.exe 1 16->21         started        24 cmd.exe 1 16->24         started        26 WerFault.exe 23 16 16->26         started        28 2 other processes 16->28 file10 signatures11 process12 signatures13 79 Uses cmd line tools excessively to alter registry or file data 21->79 30 reg.exe 1 21->30         started        33 conhost.exe 21->33         started        35 conhost.exe 24->35         started        37 reg.exe 1 1 24->37         started        process14 signatures15 83 Disables UAC (registry) 30->83
Threat name:
Win32.Trojan.GuLoader
Status:
Malicious
First seen:
2024-07-05 13:05:59 UTC
File Type:
PE (Exe)
Extracted files:
15
AV detection:
20 of 38 (52.63%)
Threat level:
  5/5
Result
Malware family:
guloader
Score:
  10/10
Tags:
family:guloader discovery downloader evasion execution persistence trojan
Behaviour
Modifies registry key
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Suspicious use of NtCreateThreadExHideFromDebugger
Suspicious use of NtSetInformationThreadHideFromDebugger
Adds Run key to start application
Legitimate hosting services abused for malware hosting/C2
Loads dropped DLL
Blocklisted process makes network request
Command and Scripting Interpreter: PowerShell
Guloader,Cloudeye
UAC bypass
Unpacked files
SH256 hash:
cb958e21c3935ef7697a2f14d64cae0f9264c91a92d2deeb821ba58852dac911
MD5 hash:
13b6a88cf284d0f45619e76191e2b995
SHA1 hash:
09ebb0eb4b1dca73d354368414906fc5ad667e06
SH256 hash:
5c66abd3f06eaa357ed9663224c927cf7120dca010572103faa88832bb31c5ab
MD5 hash:
350a507070ed063ac6a511aeef67861a
SHA1 hash:
cf647b90a1212e090f1d236d1b50a5010cbf3bae
SH256 hash:
3e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
MD5 hash:
b648c78981c02c434d6a04d4422a6198
SHA1 hash:
74d99eed1eae76c7f43454c01cdb7030e5772fc2
Detections:
win_flawedammyy_auto
Parent samples :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 hash:
77b40d42606d48f817b901f1e5abea114b4288b344b8c193bf3e3c52e469a926
MD5 hash:
d1e37112390e6bcca8362788d61becf5
SHA1 hash:
d97888f0f69d34de202e7c68b8ff5b2c2fec4c5f
SH256 hash:
88c0cb3f0b0633bb21184e1b6a9c48ca45e544922de2f73e3089538ca1180b79
MD5 hash:
da9405294ee33017a48eb728347dd68d
SHA1 hash:
639a44069006281abe7a5c9ede2a96d9abc0b18b
Detections:
win_flawedammyy_auto
Parent samples :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 hash:
39f1703e13bdc112f4ffe9240f70cd5eb5b07cc218e6b22a8d58e4dcfaadd0a1
MD5 hash:
61bdbe7854f1572202f7916cf7f03616
SHA1 hash:
e03a3385bc0cd5869c2a8cc72c80f4115b7b7945
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Detect_Nimplant_PE
Author:daniyyell
Description:Detects malicious nimplant variant PE malware.
Rule name:Detect_SliverFox_String
Author:huoji
Description:Detect files is `SliverFox` malware
Rule name:Ins_NSIS_Buer_Nov_2020_1
Author:Arkbird_SOLG
Description:Detect NSIS installer used for Buer loader
Rule name:NSIS_GuLoader
Author:NDA0E
Description:Detects GuLoader using NSIS
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
Reviews
IDCapabilitiesEvidence
AUTH_APIManipulates User AuthorizationADVAPI32.dll::SetFileSecurityA
COM_BASE_APICan Download & Execute componentsole32.dll::CoCreateInstance
SECURITY_BASE_APIUses Security Base APIADVAPI32.dll::AdjustTokenPrivileges
SHELL_APIManipulates System ShellSHELL32.dll::ShellExecuteA
SHELL32.dll::SHFileOperationA
SHELL32.dll::SHGetFileInfoA
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CreateProcessA
ADVAPI32.dll::OpenProcessToken
KERNEL32.dll::CloseHandle
KERNEL32.dll::CreateThread
WIN_BASE_APIUses Win Base APIKERNEL32.dll::LoadLibraryExA
KERNEL32.dll::GetDiskFreeSpaceA
KERNEL32.dll::GetCommandLineA
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CopyFileA
KERNEL32.dll::CreateDirectoryA
KERNEL32.dll::CreateFileA
KERNEL32.dll::DeleteFileA
KERNEL32.dll::MoveFileExA
KERNEL32.dll::MoveFileA
WIN_BASE_USER_APIRetrieves Account InformationADVAPI32.dll::LookupPrivilegeValueA
WIN_REG_APICan Manipulate Windows RegistryADVAPI32.dll::RegCreateKeyExA
ADVAPI32.dll::RegDeleteKeyA
ADVAPI32.dll::RegOpenKeyExA
ADVAPI32.dll::RegQueryValueExA
ADVAPI32.dll::RegSetValueExA
WIN_USER_APIPerforms GUI ActionsUSER32.dll::AppendMenuA
USER32.dll::EmptyClipboard
USER32.dll::FindWindowExA
USER32.dll::OpenClipboard
USER32.dll::PeekMessageA
USER32.dll::CreateWindowExA

Comments