MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6d59bb6a9874b9b03ce6ab998def5b93f68dadedccad9b14433840c2c5c3a34e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gunra


Vendor detections: 19


Intelligence 19 IOCs YARA 5 File information Comments

SHA256 hash: 6d59bb6a9874b9b03ce6ab998def5b93f68dadedccad9b14433840c2c5c3a34e
SHA3-384 hash: 12e0b8313b508453c78fcc51486f0d010419977e472887aa37bee80b4563650af1cc79bc29139a266c787a897bc84185
SHA1 hash: a7703d68e4ae4ada31fd1fb01c4169d8da56e4b7
MD5 hash: 4c0e74e9f94dff611226cd1619cb1e1d
humanhash: ack-fanta-stream-batman
File name:tool.exe_
Download: download sample
Signature Gunra
File size:199'168 bytes
First seen:2025-09-23 05:15:16 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 93fc6edbd41db10e4c203e0aaab8215c (2 x Gunra)
ssdeep 3072:W7cXqgLbJrV//R9gSRGhddVeJWfmauiOFYDw93MupBve:Mgn5VHgB/6Wu8OFYsm
TLSH T128141A01726ED6F6E09342F889529A02FDB631846B284BEFC3844B709D171D57DEDFA2
TrID 48.7% (.EXE) Win64 Executable (generic) (10522/11/4)
23.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
9.3% (.EXE) OS/2 Executable (generic) (2029/13)
9.2% (.EXE) Generic Win/DOS Executable (2002/3)
9.2% (.EXE) DOS Executable Generic (2000/1)
Magika pebin
Reporter TheRavenFile
Tags:exe gunra Ransomware


Avatar
RakeshKrish12
Source: https://github.com/TheRavenFile/Daily-Hunt/blob/main/Gunra%20Ransomware

Intelligence


File Origin
# of uploads :
1
# of downloads :
537
Origin country :
IN IN
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
tool.exe_
Verdict:
Malicious activity
Analysis date:
2025-09-23 05:17:59 UTC
Tags:
vohuk ransomware gunra

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
91.7%
Tags:
ransomware crypt blic
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Using the Windows Management Instrumentation requests
Creating a file
Creating a file in the %AppData% directory
Creating a file in the %AppData% subdirectories
Changing a file
Modifies multiple files
Reading critical registry keys
Moving a file to the %AppData% subdirectory
DNS request
Creating a file in the mass storage device
Stealing user critical data
Encrypting user's files
Enabling autorun by creating a file
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug conti expand filecoder gunra lolbin microsoft_visual_cc ransomware unsafe
Verdict:
Malicious
File Type:
exe x64
First seen:
2025-09-23T03:19:00Z UTC
Last seen:
2025-09-23T03:19:00Z UTC
Hits:
~10
Detections:
Trojan-Ransom.Win32.Agent.sb Trojan-PSW.Win32.Stealer.sb HEUR:Trojan-Ransom.Win32.Generic Trojan-Ransom.Win32.Conti.sb Trojan-Ransom.Win32.Conti.api Trojan.Win32.Udochka.sb Trojan.Win32.Agent.sb Trojan-Ransom.Win32.Encoder.sb Trojan-Ransom.Win32.Cryptor.sb
Malware family:
Gunra Ransomware
Verdict:
Malicious
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PDB Path PE (Portable Executable) PE File Layout Win 64 Exe x64
Threat name:
Win64.Ransomware.Gunra
Status:
Malicious
First seen:
2025-09-23 05:15:52 UTC
File Type:
PE+ (Exe)
Extracted files:
1
AV detection:
32 of 38 (84.21%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
gunraransomware
Similar samples:
Result
Malware family:
Score:
  10/10
Tags:
family:gunra credential_access discovery ransomware spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Uses Volume Shadow Copy service COM API
Browser Information Discovery
Drops desktop.ini file(s)
Credentials from Password Stores: Windows Credential Manager
Drops startup file
Reads user/profile data of web browsers
Renames multiple (1836) files with added filename extension
Gunra
Gunra family
Unpacked files
SH256 hash:
6d59bb6a9874b9b03ce6ab998def5b93f68dadedccad9b14433840c2c5c3a34e
MD5 hash:
4c0e74e9f94dff611226cd1619cb1e1d
SHA1 hash:
a7703d68e4ae4ada31fd1fb01c4169d8da56e4b7
Detections:
ContiRansomware
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:RANSOMWARE
Author:ToroGuitar

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments