MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 6217eb209fb47afe8f9f9d99160fc920e1f50066f3be43dbd8e48ba8695f1c51. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
GuLoader
Vendor detections: 4
| SHA256 hash: | 6217eb209fb47afe8f9f9d99160fc920e1f50066f3be43dbd8e48ba8695f1c51 |
|---|---|
| SHA3-384 hash: | ccbd0517719251939fca44d5e9879cbdb4d5f8f58e7a5096668b20a246ae9d1abe5d1424655a7176746de9cc6b4e2e54 |
| SHA1 hash: | f2d44ecfb9a654eca8a131b93f251a8a1c3fe08f |
| MD5 hash: | 1c2c2e9c91f34b35742c73b7c0c7a3fa |
| humanhash: | bakerloo-two-oregon-indigo |
| File name: | INVOICE_2134509.exe |
| Download: | download sample |
| Signature | GuLoader |
| File size: | 114'688 bytes |
| First seen: | 2020-05-26 13:40:00 UTC |
| Last seen: | 2020-05-26 15:24:30 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 4c9b3e5fc1b624ab1989cec52677f2ce (1 x GuLoader) |
| ssdeep | 768:z81834V3WTUMPUIfkZyw/h7zalUblQDZwHM3C27cKNvoRaFAbAi:I5VGTWIcZLxeUbl8aZ2pNvaJ |
| Threatray | 897 similar samples on MalwareBazaar |
| TLSH | 58B32A4734E94CB2E93C9EB548B295542DB67C227D094B133984FEAC76732CE64A438F |
| Reporter | |
| Tags: | exe GuLoader |
abuse_ch
Malspam distributing GuLoader:HELO: lycos.com
Sending IP: 199.96.83.18
From: sales1 <salvatoreaxb@lycos.com>
Subject: RE:RE: Invoice overdue for March,28 (last month)
Attachment: INVOICE_2134509.iso (contains "INVOICE_2134509.exe")
GuLoader payload URL:
https://drive.google.com/uc?export=download&id=1G71XlZQ7c-Wxgvyg8FFf59ec-8wU4Gds
Intelligence
File Origin
# of uploads :
2
# of downloads :
77
Origin country :
n/a
Vendor Threat Intelligence
Detection:
AgentTeslaV2
Detection(s):
Gathering data
Threat name:
Win32.Trojan.Fareit
Status:
Malicious
First seen:
2020-05-26 14:35:59 UTC
AV detection:
27 of 48 (56.25%)
Threat level:
2/5
Verdict:
malicious
Label(s):
guloader
Similar samples:
+ 887 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
5/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of NtSetInformationThreadHideFromDebugger
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.#AgentTesla V2
https://capesandbox.com/analysis/4955/