MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 52a75e153fce3e5d3bcba34c4e9e35db4707e928a41ffcac206b2e72c3209f5f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 9


Intelligence 9 IOCs YARA 1 File information Comments

SHA256 hash: 52a75e153fce3e5d3bcba34c4e9e35db4707e928a41ffcac206b2e72c3209f5f
SHA3-384 hash: 98a8697f5bedc5d96cb18a86edd8964aa63f1ff5f31b5bf75c279887070934951d5e1a678ff304fa55afc3bf7496816c
SHA1 hash: 8835d978e9fade46fe4183745391f6a95d57d141
MD5 hash: f2fd6e65491e85a86797d5b5875b403a
humanhash: connecticut-carolina-jig-don
File name:SecuriteInfo.com.ArtemisF2FD6E65491E.4347.31601
Download: download sample
Signature GuLoader
File size:1'703'656 bytes
First seen:2022-07-14 02:29:48 UTC
Last seen:2022-07-14 04:56:56 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 5f0c714c36e6cc016b3a1f4bc86559e4 (199 x GuLoader, 14 x Formbook, 4 x AgentTesla)
ssdeep 49152:ad6lJvV1PneIu68EdowHqaifOhvdgB/4EbBM3tn:ag5nplowHqaifOh1W4EO9n
TLSH T19875F132341880C6F47A20B16F77D5A429A07CAD51D2615EF6FAFB3AD0B23535E4E60E
TrID 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
16.4% (.EXE) Win64 Executable (generic) (10523/12/4)
10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.0% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 33f8dcf08acce033 (4 x GuLoader)
Reporter SecuriteInfoCom
Tags:exe GuLoader signed

Code Signing Certificate

Organisation:Darwinist ANTICAUSTIC Maskning SEJER BRUDSTYKKEAGTIGES
Issuer:Darwinist ANTICAUSTIC Maskning SEJER BRUDSTYKKEAGTIGES
Algorithm:sha256WithRSAEncryption
Valid from:2022-07-14T00:04:03Z
Valid to:2023-07-14T00:04:03Z
Serial number: -21de989396791f2a
Thumbprint Algorithm:SHA256
Thumbprint: f74c81f1c5c610d040f4b13633543e49e60a99c7b32525c45f13bf699fbafdd4
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
241
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
SecuriteInfo.com.ArtemisF2FD6E65491E.4347.31601
Verdict:
Malicious activity
Analysis date:
2022-07-14 02:32:20 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Creating a window
Searching for the window
Creating a file
Delayed reading of the file
Creating a file in the %temp% subdirectories
Searching for the Windows task manager window
Running batch commands
Creating a process with a hidden window
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
buer overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
52 / 100
Signature
Multi AV Scanner detection for submitted file
Obfuscated command line found
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 663424 Sample: SecuriteInfo.com.ArtemisF2F... Startdate: 14/07/2022 Architecture: WINDOWS Score: 52 52 Multi AV Scanner detection for submitted file 2->52 8 SecuriteInfo.com.ArtemisF2FD6E65491E.4347.exe 4 56 2->8         started        process3 file4 44 C:\Users\user\Pictures\...\lang-1040.dll, PE32 8->44 dropped 46 C:\Users\user\Pictures\...\ugeniso.dll, PE32 8->46 dropped 48 C:\Users\...\ARMOURY CRATE eGPU Product.exe, PE32+ 8->48 dropped 50 C:\Users\user\AppData\Local\...\nsExec.dll, PE32 8->50 dropped 54 Obfuscated command line found 8->54 12 cmd.exe 1 8->12         started        14 cmd.exe 1 8->14         started        16 cmd.exe 1 8->16         started        18 64 other processes 8->18 signatures5 process6 process7 20 conhost.exe 12->20         started        22 conhost.exe 12->22         started        24 conhost.exe 14->24         started        26 conhost.exe 14->26         started        28 conhost.exe 16->28         started        30 conhost.exe 18->30         started        32 conhost.exe 18->32         started        34 conhost.exe 18->34         started        36 54 other processes 18->36 process8 38 conhost.exe 20->38         started        40 conhost.exe 28->40         started        42 conhost.exe 30->42         started       
Threat name:
Win32.Trojan.GuLoader
Status:
Malicious
First seen:
2022-07-14 00:33:18 UTC
File Type:
PE (Exe)
Extracted files:
20
AV detection:
12 of 26 (46.15%)
Threat level:
  5/5
Verdict:
suspicious
Result
Malware family:
guloader
Score:
  10/10
Tags:
family:guloader downloader
Behaviour
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Loads dropped DLL
Guloader,Cloudeye
Unpacked files
SH256 hash:
10675f13abaee592f14382349aa35d82fb52aab4e27eef61d0c83dec1f6b73da
MD5 hash:
5aa38904acdcc21a2fb8a1d30a72d92f
SHA1 hash:
a9ce7d1456698921791db91347dba0489918d70c
SH256 hash:
6afc379db09413c59646e9ca45ac098b578f4fee6010b716f1e09836979931df
MD5 hash:
dcff8de7950c55510edf7249fecfe57e
SHA1 hash:
332fefb8d064eb262a53749c3e0cf762af894917
SH256 hash:
52a75e153fce3e5d3bcba34c4e9e35db4707e928a41ffcac206b2e72c3209f5f
MD5 hash:
f2fd6e65491e85a86797d5b5875b403a
SHA1 hash:
8835d978e9fade46fe4183745391f6a95d57d141
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Ins_NSIS_Buer_Nov_2020_1
Author:Arkbird_SOLG
Description:Detect NSIS installer used for Buer loader

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments