MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 706d17f8918076d94553487e8a8a51c2145ae4530a4ab9993c3b0e0480edf57c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
GuLoader
Vendor detections: 4
| SHA256 hash: | 706d17f8918076d94553487e8a8a51c2145ae4530a4ab9993c3b0e0480edf57c |
|---|---|
| SHA3-384 hash: | cd54bd7402e53beba704dc260110ac1efb589345bbf8e4cc975efff91496e836518757b330a7466c690b98262f833407 |
| SHA1 hash: | 0cc763f0de146d4e253134bc95d3d00bbddac7c3 |
| MD5 hash: | 2f18915a978f143398e307c7a25e528d |
| humanhash: | four-princess-network-utah |
| File name: | FA.202005.000638.DOC.exe |
| Download: | download sample |
| Signature | GuLoader |
| File size: | 65'536 bytes |
| First seen: | 2020-06-10 11:34:15 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 01b4661cfcc15cfac55f4d035d59ebca (1 x GuLoader) |
| ssdeep | 768:bIwGMjJvbviBAyI/OUaOg289NruLyNDOgbglUaZoCWSMT65Bl:bzG0Lp2U3YO2Odl/ |
| Threatray | 799 similar samples on MalwareBazaar |
| TLSH | 3F535C5B39089D53E020C3B02D6295A56728BD689501AF1B3E9C7F5DDF72A827CE331A |
| Reporter | |
| Tags: | exe GuLoader |
abuse_ch
Malspam distributing GuLoader:HELO: myuncommon.favour.com127.0.0.1
Sending IP: 2.56.8.246
From: info@gratacos.site
Subject: Pago rechazado
Attachment: FA.202005.000638.DOC.img (contains "FA.202005.000638.DOC.exe")
GuLoader payload URL:
https://onedrive.live.com/Download?cid=3BCD34D8AC2D7789&resid=3BCD34D8AC2D7789%21435&authkey=ADMsJhgPkBTcqZs
Intelligence
File Origin
# of uploads :
1
# of downloads :
83
Origin country :
n/a
Vendor Threat Intelligence
Detection:
n/a
Detection(s):
Gathering data
Threat name:
Win32.Infostealer.Fareit
Status:
Malicious
First seen:
2020-06-10 11:36:06 UTC
AV detection:
25 of 31 (80.65%)
Threat level:
5/5
Detection(s):
Malicious file
Verdict:
malicious
Label(s):
guloader
Similar samples:
+ 789 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
5/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of NtSetInformationThreadHideFromDebugger
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.