MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5f50b2bbd132ec4fcb465de520ce20c653579588069de9dc8f14579ebe2d062c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 7


Intelligence 7 IOCs YARA 3 File information Comments

SHA256 hash: 5f50b2bbd132ec4fcb465de520ce20c653579588069de9dc8f14579ebe2d062c
SHA3-384 hash: 7714adae01c2877457dcf191b296f19974eb991ad6beb62828e9ce7295b93ba0148815f021f33fea39b869e6a72b1abd
SHA1 hash: f3f8eff2149c3a7fa540113133c61b6065968058
MD5 hash: 4ce23c67160357c2102f8c5f6f669adf
humanhash: fish-eleven-quiet-venus
File name:sales contract-876 & New-Order.gz
Download: download sample
Signature GuLoader
File size:507'625 bytes
First seen:2023-02-26 08:26:34 UTC
Last seen:Never
File type: gz
MIME type:application/x-rar
ssdeep 12288:axp3qSCuI3+He3MeLKc1FrWKTJLb4LgHgs8An14ctyXX0I1Ew:aTxCuu+a7ec1pJTJ4kHpn9SXV1Ew
TLSH T142B42312F4C568DFA41E8B790A8BFD4CD7AED00B075043265462B09BD748467ABBF8B7
TrID 61.5% (.RAR) RAR compressed archive (v5.0) (8000/1)
38.4% (.RAR) RAR compressed archive (gen) (5000/1)
Reporter cocaman
Tags:GuLoader gz


Avatar
cocaman
Malicious email (T1566.001)
From: "Lynn / Business Manager<lila@midasconcepts.com>" (likely spoofed)
Received: "from midasconcepts.com (ip204.ip-176-31-196.eu [176.31.196.204]) "
Date: "24 Feb 2023 06:01:13 -0800"
Subject: "sales contract-876 & New-Order"
Attachment: "sales contract-876 & New-Order.gz"

Intelligence


File Origin
# of uploads :
1
# of downloads :
99
Origin country :
n/a
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:sales contract-876 & New-Order.exe
File size:579'728 bytes
SHA256 hash: 412f983cf1fb087d9b21bed966aaf91b7468ed1c9f792fb32e5b0a6e9dbbf0c1
MD5 hash: 9fb914c9a670ac3f2d7b43552c65ad10
MIME type:application/x-dosexec
Signature GuLoader
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Guloader
Status:
Suspicious
First seen:
2023-02-24 14:51:49 UTC
File Type:
Binary (Archive)
Extracted files:
15
AV detection:
12 of 25 (48.00%)
Threat level:
  5/5
Result
Malware family:
guloader
Score:
  10/10
Tags:
family:guloader discovery downloader
Behaviour
Enumerates physical storage devices
Checks installed software on the system
Loads dropped DLL
Guloader,Cloudeye
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

GuLoader

gz 5f50b2bbd132ec4fcb465de520ce20c653579588069de9dc8f14579ebe2d062c

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments