MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5c86fcf32d1f15a745dd2f39989630ac310d1aee52af7b5f762f75f8855879ab. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 5c86fcf32d1f15a745dd2f39989630ac310d1aee52af7b5f762f75f8855879ab
SHA3-384 hash: 9f065ebdc6df288785a06a2898e9f88dd6fe20be45b85b224a86f8bfb31af89d26aab718d3abafed45e6da7012ae1d5a
SHA1 hash: 765671579aac0864ceee94f0f387f5076944c18d
MD5 hash: 004f65cf74786fed79027508c5ea74d8
humanhash: golf-burger-bakerloo-tennessee
File name:SecuriteInfo.com.Generic.mg.004f65cf74786fed.10835
Download: download sample
Signature GuLoader
File size:122'880 bytes
First seen:2020-03-18 13:39:06 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash a205e8233d91c85892f439fc2ee2c11c (1 x GuLoader)
ssdeep 1536:1gkGTYXvIr9LcF4zlgxh1XvnV8BleY+O+Ra2TNKeDlgrBVCtw5w:mS/egFIlgzdPjRISlQVMsw
Threatray 1'068 similar samples on MalwareBazaar
TLSH 51C37E43FF50D477D518893EAC47C2A2091BBC6465E2EA4B3994BB2E78F41B18F1E711
Reporter SecuriteInfoCom
Tags:GuLoader

Intelligence


File Origin
# of uploads :
1
# of downloads :
94
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Injector
Status:
Malicious
First seen:
2020-03-18 18:23:00 UTC
AV detection:
25 of 30 (83.33%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

GuLoader

Executable exe 5c86fcf32d1f15a745dd2f39989630ac310d1aee52af7b5f762f75f8855879ab

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
VB_APILegacy Visual Basic API usedMSVBVM60.DLL::EVENT_SINK_AddRef

Comments