MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 541c870536f63dd8b9eb7406fec6031505c59f5c21c8a6f581e5b29349a4a92b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 541c870536f63dd8b9eb7406fec6031505c59f5c21c8a6f581e5b29349a4a92b
SHA3-384 hash: e54ad99dedb893da1adadc08a6bafd37ad0f440dadbeadee5c9810d68e62808fdf688f04e335f076f02b0795bbf9bfce
SHA1 hash: 6920891725d2a49dff34cfaacf16f591fc1e1e64
MD5 hash: 0595e02c4aaef75b1db97c17f3fbbef7
humanhash: violet-autumn-river-colorado
File name:Items & Materials Required for the Federal Precinct in Zayed City.com
Download: download sample
Signature GuLoader
File size:65'536 bytes
First seen:2020-06-10 06:50:16 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 14fc9e4eccdae00a171acb5d1aa5f5d5 (1 x GuLoader)
ssdeep 768:brmGMjJvbviBmB0Nrw2PpZVHpe+cRUkblNS0UOlmSZUdSvayrWJMT6P3UUG:biG0nB0NFhcOObZUdSm
Threatray 2'325 similar samples on MalwareBazaar
TLSH BC533B5B7D0CA553E0A047B0297295B16B29BC289501BF4B3E9C6F6DDB329C27DC331A
Reporter abuse_ch
Tags:com GuLoader


Avatar
abuse_ch
Malspam distributing GuLoader:

HELO: mailmarketingworldpad.live
Sending IP: 106.75.36.102
From: Sachini Rathnayeka <sales@mailmarketingworldpad.live>
Reply-To: Sachini Rathnayeka <office.rep@mail.ru>
Subject: RFQ: Infrastructure, Public Realm & Residential Buildings for Federal Precinct in Zayed City
Attachment: Items Materials Required for the Federal Precinct in Zayed City.rar (contains "Items & Materials Required for the Federal Precinct in Zayed City.com")

GuLoader payload URL:
https://onedrive.live.com/download?cid=B3805920E5EB0711&resid=B3805920E5EB0711%21123&authkey=AJ18p0rtfbTWA84

Intelligence


File Origin
# of uploads :
1
# of downloads :
87
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Infostealer.Fareit
Status:
Malicious
First seen:
2020-06-10 06:52:08 UTC
AV detection:
25 of 31 (80.65%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of NtSetInformationThreadHideFromDebugger
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

GuLoader

Executable exe 541c870536f63dd8b9eb7406fec6031505c59f5c21c8a6f581e5b29349a4a92b

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments