MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 60201a00a9f96b8efea761e31e3483a7a5bfd04ad66f766b3dd7b24e00664069. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
GuLoader
Vendor detections: 3
| SHA256 hash: | 60201a00a9f96b8efea761e31e3483a7a5bfd04ad66f766b3dd7b24e00664069 |
|---|---|
| SHA3-384 hash: | 7b16ad68c9774857b8c5b9d7600aee9bb946ec59f2e021697d3bf7d27b7e0986ca13459cd706af709d1ce840eb6a1474 |
| SHA1 hash: | 0f8e3840947f0e71b0ef6aa4738d6d61c9dad9f0 |
| MD5 hash: | d29fd66f1d89911686bf374e7d755da2 |
| humanhash: | violet-stream-ceiling-happy |
| File name: | WIRE REFERENCE.exe |
| Download: | download sample |
| Signature | GuLoader |
| File size: | 151'552 bytes |
| First seen: | 2020-05-27 18:25:32 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 0d954f5c1497e90611e37b18a7fbd0b0 (1 x GuLoader) |
| ssdeep | 1536:kf4RvVSJx3MqGNkK+gvP7+bNPb5KBBkm36brqz0+f90N85gV:jvMINMO+5bOlIWzNfaKgV |
| Threatray | 1'010 similar samples on MalwareBazaar |
| TLSH | 87E38505BED5AC7DD55A2EF16885A8962A1A2C00BF0413EF21D0FB7D72368E17C71B1E |
| Reporter | |
| Tags: | exe GuLoader |
abuse_ch
Malspam distributing GuLoader:HELO: slot0.boellhof.com
Sending IP: 45.95.169.21
From: karla Friede <karla.friede@nvoicepay.com>
Subject: WIRE REFERENCE FOR NVOICEPAY PAYMENT #4321453
Attachment: WIRE REFERENCE.IMG (contains "WIRE REFERENCE.exe")
GuLoader payload URL:
http://185.205.209.166/wext/Rem-Stub23_tkxlq56.bin
Intelligence
File Origin
# of uploads :
1
# of downloads :
82
Origin country :
n/a
Vendor Threat Intelligence
Detection:
n/a
Gathering data
Threat name:
Win32.Trojan.Injector
Status:
Malicious
First seen:
2020-05-27 18:37:22 UTC
File Type:
PE (Exe)
Extracted files:
6
AV detection:
17 of 31 (54.84%)
Threat level:
5/5
Verdict:
malicious
Label(s):
remcos
guloader
Similar samples:
+ 1'000 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
5/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of NtSetInformationThreadHideFromDebugger
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.