MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4d0dfe01c27dfd2c35464a3f435cfb4cad6e996d6fc407cc8f10fc0b3d0692fe. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 4d0dfe01c27dfd2c35464a3f435cfb4cad6e996d6fc407cc8f10fc0b3d0692fe
SHA3-384 hash: b29d7b38e0ac4838c924074edf7aebc26a23a6200a1b9fed9415289362ae568efb3630e43c08e137da7bf373a7b48af4
SHA1 hash: a7a897ed27ce16d1b512f0109a078bb56c391af6
MD5 hash: 903aec13bbbd009c94a8179673cb10e1
humanhash: speaker-pennsylvania-grey-enemy
File name:FedEx_Shipment AWB & Receipt.exe
Download: download sample
Signature GuLoader
File size:73'728 bytes
First seen:2020-06-04 15:54:43 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 8b96c63053885b9cd368b2968e25d2d9 (1 x GuLoader)
ssdeep 1536:f2C4XKxWfF14xzJcg2ATNSm/gn0RwFWnQ:fg6xQQkfm/gn0OZ
Threatray 1'034 similar samples on MalwareBazaar
TLSH 65733942A1A4EE70E51442F08E3166F8016B7C34D861C9376B357E2A3B73E9A617F71B
Reporter abuse_ch
Tags:exe FedEx GuLoader


Avatar
abuse_ch
Malspam distributing GuLoader:

HELO: slot0.acthrous.com
Sending IP: 45.95.169.133
From: "FedEx" <fedExparcel@fedex.com>
Subject: Your Shipment is ready - FedEx
Attachment: FedEx_Shipment AWB Receipt.gz (contains "FedEx_Shipment AWB & Receipt.exe")

GuLoader payload URL:
https://onedrive.live.com/download?cid=8D14D74EB13B02D0&resid=8D14D74EB13B02D0%21165&authkey=AK9xKR3bSwK3PSo

Intelligence


File Origin
# of uploads :
1
# of downloads :
88
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Vebzenpak
Status:
Malicious
First seen:
2020-06-04 12:01:42 UTC
AV detection:
22 of 31 (70.97%)
Threat level:
  5/5
Result
Malware family:
warzonerat
Score:
  10/10
Tags:
family:warzonerat infostealer persistence rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Adds Run key to start application
Loads dropped DLL
Executes dropped EXE
ServiceHost packer
WarzoneRat, AveMaria
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

GuLoader

Executable exe 4d0dfe01c27dfd2c35464a3f435cfb4cad6e996d6fc407cc8f10fc0b3d0692fe

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments