MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 4b610516f134b6efb2100a2e298a70b573be1cd6c4d653af007b907f11ff065e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
GuLoader
Vendor detections: 5
| SHA256 hash: | 4b610516f134b6efb2100a2e298a70b573be1cd6c4d653af007b907f11ff065e |
|---|---|
| SHA3-384 hash: | f3db7ab9028a20acfcd8c608965f22967f79c9a24bf959a28bf4a14a7329c1c045037db3adc5c555383274cfa47ddfb1 |
| SHA1 hash: | a67456c6983f168e4c003733da79b04ab8bea6bc |
| MD5 hash: | eda84bfbf778d390bebf4f31d4df84c9 |
| humanhash: | orange-timing-utah-carpet |
| File name: | SOA PNC_pdf.exe |
| Download: | download sample |
| Signature | GuLoader |
| File size: | 110'592 bytes |
| First seen: | 2020-06-03 13:04:07 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 4ea9e45dfafecf5cc308500d5f689669 (1 x GuLoader) |
| ssdeep | 1536:VYdSPfxV40q0L89E49kgrKHxLdGKc+o0FDHdZ1gIjlap42JvwWyYjAVrG9:VHPXtUrlKVdhjFD9zHc2Vq9 |
| Threatray | 2'035 similar samples on MalwareBazaar |
| TLSH | 7AB38B03EC4D8A53D10487BD2D178EB93B0DB91D0D406BEF7139AE9BAE716522C9721E |
| Reporter | |
| Tags: | exe GuLoader |
abuse_ch
Malspam distributing GuLoader:HELO: server.gegcc.com
Sending IP: 192.64.78.30
From: tariq@gegcc.com
Subject: Fwd: SOA - Oustanding Balance Payment Schedule
Attachment: SOA PNC_zip.arj (contains "SOA PNC_pdf.exe")
Intelligence
File Origin
# of uploads :
1
# of downloads :
70
Origin country :
n/a
Vendor Threat Intelligence
Detection:
Loki
Detection(s):
Gathering data
Threat name:
Win32.Trojan.Formbook
Status:
Malicious
First seen:
2020-06-03 17:35:15 UTC
AV detection:
14 of 31 (45.16%)
Threat level:
2/5
Detection(s):
Malicious file
Verdict:
malicious
Label(s):
lokipasswordstealer(pws)
guloader
Similar samples:
+ 2'025 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
5/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of NtSetInformationThreadHideFromDebugger
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.