MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 5281b04770cbfc7ab88d17ef529b8c59092d101e349d0140a8645da16aed369d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
GuLoader
Vendor detections: 4
| SHA256 hash: | 5281b04770cbfc7ab88d17ef529b8c59092d101e349d0140a8645da16aed369d |
|---|---|
| SHA3-384 hash: | 4b98a03f387eb63b4d037cbbade5b78c00525175800913a5606be943594264e1e61fe6e31e699187ea6276f828170c34 |
| SHA1 hash: | 0e5250d91ee00e102f0abab71a48132885f01791 |
| MD5 hash: | c97f5c3009ac3250b58fa00f67ccf071 |
| humanhash: | bluebird-speaker-seven-burger |
| File name: | udlaa.exe |
| Download: | download sample |
| Signature | GuLoader |
| File size: | 94'208 bytes |
| First seen: | 2020-05-21 08:39:31 UTC |
| Last seen: | 2020-05-21 09:51:41 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 785636312fa9ab0165ea111bc09a1221 (1 x GuLoader) |
| ssdeep | 768:AAKmJ+qnswdRvH89RO2nCGQigiwQTgv8DgR9y4bhhhUBNo6qSk:AA4TwrgPCG/2Q7K1TUBNov |
| Threatray | 584 similar samples on MalwareBazaar |
| TLSH | B8932A63F962BEB8D97A0BF24C324650046BECF11CD75A07E5CA3A0D0D37A8E981571A |
| Reporter | |
| Tags: | DHL exe geo GuLoader KOR |
abuse_ch
Malspam distributing GuLoader:HELO: poc.creationfinancial.co.uk
Sending IP: 178.62.94.186
From: DHL Korea <info@trailnet.com>
Reply-To: dhlofficekorea@asia.com
Subject: 소포 도착을위한 DHL KOREA INFORMATION입니다
Attachment: DHL Korea Documents.img (contains "udlaa.exe")
GuLoader payload URL:
http://izpanelone.webredirect.org/uploud/5bab0b1d864615bab0b1d864b3/bin_TirFIsqp75.bin
Intelligence
File Origin
# of uploads :
2
# of downloads :
86
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Injector
Status:
Malicious
First seen:
2020-05-21 03:57:36 UTC
AV detection:
24 of 31 (77.42%)
Threat level:
2/5
Detection(s):
Malicious file
Verdict:
malicious
Label(s):
guloader
Similar samples:
+ 574 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
7/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of NtSetInformationThreadHideFromDebugger
Checks QEMU agent state file
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.