MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6071f492ac8c77276c835e56c32be50594b69aab8a00f05fbdbade329fc7f46c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 6071f492ac8c77276c835e56c32be50594b69aab8a00f05fbdbade329fc7f46c
SHA3-384 hash: 4b21107712fb3219d6d55543707158e5888680c8729df7fb9db511c2d248489095266c9fac5a72e7c2121ba862aa596a
SHA1 hash: 480a107b70c1c6b9569fe7a51a58940130221345
MD5 hash: 04193c516813ff751e09abf20546bd15
humanhash: april-violet-early-comet
File name:04193c516813ff751e09abf20546bd15.exe
Download: download sample
Signature GuLoader
File size:81'920 bytes
First seen:2020-06-02 10:13:22 UTC
Last seen:2020-06-02 12:59:30 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash a4aebdfbd2d7d5847a70bb5e7cc7825d (1 x GuLoader)
ssdeep 768:E8fhc7416N8lBR2zHeQ7bvUnaBbhRBbNF8Wvk78zPRUl8nbWY6Lr/RgCt0a/mK60:nfFO8lLbSrBdriiRUlsB6Lr/RgCt0a+
Threatray 949 similar samples on MalwareBazaar
TLSH B6834A57EE8C9912D12583742C4BCBAA6F11BC5D48821F8F345E6E6BBB313A25C6D30D
Reporter abuse_ch
Tags:exe GuLoader


Avatar
abuse_ch
GuLoader payload URL:
http://cocomexdelbajio.com/files/ekwe%20origin%20net4_zYwPd26.bin

Intelligence


File Origin
# of uploads :
2
# of downloads :
68
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Injector
Status:
Malicious
First seen:
2020-06-01 17:31:34 UTC
File Type:
PE (Exe)
Extracted files:
6
AV detection:
19 of 31 (61.29%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of NtSetInformationThreadHideFromDebugger
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments