MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5e7792550edc1085dfffcf3dad7dbc31e164c7149abdce5bbaae0715106a2e1c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 5e7792550edc1085dfffcf3dad7dbc31e164c7149abdce5bbaae0715106a2e1c
SHA3-384 hash: e1c536c1cfe1ce3021739a9726dcefc19b97d3cc6f2fbc4f32104b5794db6728709d5f539dc450f9bc9fb0b01b543f8a
SHA1 hash: aa00c75bcb92bb3286e6e8b10c4d40135db3a2a6
MD5 hash: 6245a28f7c93c175879998bf0312809d
humanhash: oven-mobile-two-foxtrot
File name:SecuriteInfo.com.Heur.PonyStealer.fm0@qGkKMUji.4243.25482
Download: download sample
Signature GuLoader
File size:81'920 bytes
First seen:2020-03-23 19:51:43 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash eb3768a31344aeff5660f0fcfb677b3e (1 x GuLoader)
ssdeep 1536:VwKCMOsfz0jtDQtbfZPeM4s+p1m1S8/O2x:ofsf4pDQtbfZP++p/Z
Threatray 888 similar samples on MalwareBazaar
TLSH 24836C03FA00E861C89DC73D6C47D7A215277CA96D41D69B36D47B0F28F21628F2DB69
Reporter SecuriteInfoCom
Tags:GuLoader

Intelligence


File Origin
# of uploads :
1
# of downloads :
90
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Injector
Status:
Malicious
First seen:
2020-03-23 13:13:36 UTC
File Type:
PE (Exe)
Extracted files:
6
AV detection:
26 of 31 (83.87%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

GuLoader

Executable exe 5e7792550edc1085dfffcf3dad7dbc31e164c7149abdce5bbaae0715106a2e1c

(this sample)

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
VB_APILegacy Visual Basic API usedMSVBVM60.DLL::EVENT_SINK_AddRef

Comments