MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 57bb966172a1d6bc994a682ef5da9b8b8fdabef539f44024c7e9368e6416d457. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 57bb966172a1d6bc994a682ef5da9b8b8fdabef539f44024c7e9368e6416d457
SHA3-384 hash: b852079ddf41671a1f6930dad1fe8ba69a3d37d4d6646903150138e8562ea527bae36ce274a1c95b8a909b3363188c91
SHA1 hash: 984b261b9826920c531d6e692e94164b71da0520
MD5 hash: 9242b0ac21d63b8b11b19b0ebedca566
humanhash: ohio-oxygen-quiet-island
File name:9242b0ac21d63b8b11b19b0ebedca566.exe
Download: download sample
Signature GuLoader
File size:77'824 bytes
First seen:2020-06-01 08:26:30 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c9ac5f2d87ad26f02dffb0bc97521484 (1 x GuLoader)
ssdeep 768:olYXuBZjpY9P7JDI0u7W7mPcJk5FlCTavfEWqhYIcfleVoD2BmqwcZRKcW:8Y+B/Y9VWUlksTsWR
Threatray 928 similar samples on MalwareBazaar
TLSH A5731B1EBE5D8579F44585712459D0A6BB2ABC3218029E0F73016E9BF8B2983FCF1727
Reporter abuse_ch
Tags:exe GuLoader


Avatar
abuse_ch
GuLoader payload URL:
https://drive.google.com/uc?export=download&id=1PMlAGJi2TCvjcdrsfIPxV1In06rn1gIi

Intelligence


File Origin
# of uploads :
1
# of downloads :
77
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Injector
Status:
Malicious
First seen:
2020-06-01 08:36:30 UTC
AV detection:
23 of 48 (47.92%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of NtSetInformationThreadHideFromDebugger
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

GuLoader

Executable exe 57bb966172a1d6bc994a682ef5da9b8b8fdabef539f44024c7e9368e6416d457

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments