MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6b0160f66895ab61b35d67e246d3a5855ba6788fa4416680bea57ea2d1f72de1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 15


Intelligence 15 IOCs YARA 2 File information Comments

SHA256 hash: 6b0160f66895ab61b35d67e246d3a5855ba6788fa4416680bea57ea2d1f72de1
SHA3-384 hash: db3cea0d35d31159b9687bb1bc051f62b6ec818171d54cf9b228d13c54a226198452fec6f8b7f62d5eefb072d6ca87a7
SHA1 hash: 4319392de6b1c3fd58982da578ac89eb70c0318b
MD5 hash: 1cedef000c6ff6f285a05cdd7aaa5da0
humanhash: snake-thirteen-arkansas-crazy
File name:Drawing & specs.bat
Download: download sample
Signature GuLoader
File size:811'488 bytes
First seen:2026-03-31 06:39:35 UTC
Last seen:2026-03-31 07:30:08 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash b34f154ec913d2d2c435cbd644e91687 (563 x GuLoader, 120 x RemcosRAT, 82 x EpsilonStealer)
ssdeep 24576:bC3lq8aYT++MISBc8Xn3o30epj77/EBboj980J:Ml2hLIN03o30ex7LObc9P
TLSH T12C05F1C26608A9A9DA77B3B1AE2F6EF103C339352950D3DF26C5631E45B1F23011B667
TrID 50.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
10.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
10.5% (.EXE) Win64 Executable (generic) (6522/11/2)
8.1% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.2% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
dhash icon 74f0ecccccccccd4 (1 x GuLoader)
Reporter lowmal3
Tags:exe GuLoader

Intelligence


File Origin
# of uploads :
2
# of downloads :
116
Origin country :
DE DE
Vendor Threat Intelligence
Gathering data
Malware family:
ID:
1
File name:
cd9a6c7d9ec7314caa538c6c57d07402c29424dd17b13c215f97769a6782c83d.zip
Verdict:
Malicious activity
Analysis date:
2026-03-31 06:26:13 UTC
Tags:
arch-exec remcos rat

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Gathering data
Verdict:
Malicious
Score:
96.5%
Tags:
injection virus blic
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Searching for the window
Creating a file
DNS request
Connection attempt
Creating a file in the %temp% directory
Delayed reading of the file
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
adaptive-context anti-debug blackhole fingerprint installer installer installer-heuristic masquerade microsoft_visual_cc nsis soft-404 unsafe
Verdict:
Malicious
File Type:
exe x32
First seen:
2026-03-31T02:15:00Z UTC
Last seen:
2026-04-01T04:56:00Z UTC
Hits:
~1000
Detections:
Trojan.NSIS.Makoob.sbb Trojan.NSIS.Makoob.sba Trojan.Win32.GuLoader.sb HEUR:Trojan.NSIS.Kryptik.gen Trojan-Downloader.Win32.Minix.sb HEUR:Trojan.Win32.GuLoader.gen UDS:DangerousObject.Multi.Generic
Result
Threat name:
n/a
Detection:
malicious
Classification:
evad
Score:
68 / 100
Signature
Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Unusual module load detection (module proxying)
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1891270 Sample: Drawing & specs.bat.exe Startdate: 31/03/2026 Architecture: WINDOWS Score: 68 19 jieqaingdaolu.com 2->19 21 Antivirus detection for URL or domain 2->21 23 Multi AV Scanner detection for submitted file 2->23 25 Tries to detect virtualization through RDTSC time measurements 2->25 27 2 other signatures 2->27 8 Drawing & specs.bat.exe 2 43 2->8         started        signatures3 process4 file5 17 C:\Users\user\AppData\Local\...\System.dll, PE32 8->17 dropped 11 Drawing & specs.bat.exe 6 8->11         started        13 Drawing & specs.bat.exe 8->13         started        process6 process7 15 Drawing & specs.bat.exe 11->15         started       
Verdict:
inconclusive
YARA:
5 match(es)
Tags:
Executable NSIS Installer PE (Portable Executable) PE File Layout Win 32 Exe x86
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2026-03-31 05:31:37 UTC
File Type:
PE (Exe)
Extracted files:
12
AV detection:
15 of 24 (62.50%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:remcos botnet:remotehost collection discovery rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Windows directory
Suspicious use of NtCreateThreadExHideFromDebugger
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses Microsoft Outlook accounts
Loads dropped DLL
Detected Nirsoft tools
Remcos
Remcos family
Malware Config
C2 Extraction:
newremc.duckdns.org:2404
Unpacked files
SH256 hash:
6b0160f66895ab61b35d67e246d3a5855ba6788fa4416680bea57ea2d1f72de1
MD5 hash:
1cedef000c6ff6f285a05cdd7aaa5da0
SHA1 hash:
4319392de6b1c3fd58982da578ac89eb70c0318b
SH256 hash:
a632d74332b3f08f834c732a103dafeb09a540823a2217ca7f49159755e8f1d7
MD5 hash:
75ed96254fbf894e42058062b4b4f0d1
SHA1 hash:
996503f1383b49021eb3427bc28d13b5bbd11977
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Detect_NSIS_Nullsoft_Installer
Author:Obscurity Labs LLC
Description:Detects NSIS installers by .ndata section + NSIS header string
Rule name:VECT_Ransomware
Author:Mustafa Bakhit
Description:Detects activity associated with VECT ransomware. This includes registry modifications and deletions, execution of system and defense-evasion commands, suspicious API usage, mutex creation, file and memory manipulation, ransomware note generation, anti-debugging and anti-analysis techniques, and embedded cryptographic constants (SHA256) characteristic of this malware family. Designed for threat intelligence and malware detection environments.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

GuLoader

Executable exe 6b0160f66895ab61b35d67e246d3a5855ba6788fa4416680bea57ea2d1f72de1

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments