MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7570a7a6830ade05dcf862d5862f12f12445dbd3c0ad7433d90872849e11c267. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: 7570a7a6830ade05dcf862d5862f12f12445dbd3c0ad7433d90872849e11c267
SHA3-384 hash: 2c910a4c2ae0fb93181270d679c041bd62977af1994da4bccaf0968993e81a55545556637beb9b6634f828cf7aef9c93
SHA1 hash: 7ab5ed449b891bd4899fba62d027a2cc26a05e6f
MD5 hash: af8e86c5d4198549f6375df9378f983c
humanhash: green-tango-fifteen-august
File name:31.exe
Download: download sample
Signature GuLoader
File size:13'128'192 bytes
First seen:2020-11-24 08:23:23 UTC
Last seen:2025-01-23 02:31:12 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 5877688b4859ffd051f6be3b8e0cd533 (119 x Babadeda, 2 x DCRat, 2 x RedLineStealer)
ssdeep 393216:oKzkshyIMtAcwzhQ/CceAocPwz3fwnjWKlDc8F6tB:BzkmSmzS/Be/cPquj7D36r
TLSH 81D6330391E58681C294ED3265F5747BF733E6AF0370F9C3A32FA2159D865870BAA325
Reporter Anonymous
Tags:GuLoader

Intelligence


File Origin
# of uploads :
4
# of downloads :
106
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a file in the %AppData% directory
Sending a UDP request
Running batch commands
Creating a process with a hidden window
Creating a process from a recently created file
Creating a window
Launching a process
Launching cmd.exe command interpreter
Searching for the window
Setting a keyboard event handler
Connection attempt
Creating a file
Deleting a recently created file
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Setting a single autorun event
Unauthorized injection to a system process
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Ursnif AgentTesla FormBook Wadhrama
Detection:
malicious
Classification:
rans.troj.adwa.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Contains functionality to detect sleep reduction / modifications
Contains functionality to hide a thread from the debugger
Contains functionality to log keystrokes (.Net Source)
Creates an autostart registry key pointing to binary in C:\Windows
Creates autostart registry keys with suspicious names
Creates autostart registry keys with suspicious values (likely registry only malware)
Creates files in the recycle bin to hide itself
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Drops PE files to the startup folder
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Add file from suspicious location to autostart registry
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Writes registry values via WMI
Yara detected Ursnif
Yara detected AgentTesla
Yara detected Allatori_JAR_Obfuscator
Yara detected FormBook
Yara detected Wadhrama Ransomware
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 321991 Sample: 31.exe Startdate: 24/11/2020 Architecture: WINDOWS Score: 100 80 www.sensomaticloadcell.com 2->80 82 www.fisioservice.com 2->82 84 13 other IPs or domains 2->84 118 Malicious sample detected (through community Yara rule) 2->118 120 Antivirus detection for dropped file 2->120 122 Antivirus / Scanner detection for submitted sample 2->122 124 13 other signatures 2->124 10 31.exe 39 2->10         started        signatures3 process4 file5 54 C:\Users\user\AppData\Roaming\8.exe, PE32 10->54 dropped 56 C:\Users\user\AppData\Roaming\7.exe, PE32 10->56 dropped 58 C:\Users\user\AppData\Roaming\6.exe, PE32 10->58 dropped 60 28 other files (18 malicious) 10->60 dropped 13 cmd.exe 3 2 10->13         started        process6 process7 15 16.exe 13->15         started        19 13.exe 13->19         started        21 2.exe 13->21         started        23 16 other processes 13->23 dnsIp8 64 C:\Users\user\AppData\Roaming\...\16.exe, PE32 15->64 dropped 66 C:\ProgramData\Microsoft\Windows\...\16.exe, PE32 15->66 dropped 68 C:\Windows\System32\16.exe, PE32 15->68 dropped 70 desktop.ini.id-63A...otonmail.com].BOMBO, data 15->70 dropped 92 Antivirus detection for dropped file 15->92 94 Creates files in the recycle bin to hide itself 15->94 96 Machine Learning detection for dropped file 15->96 98 Drops PE files to the startup folder 15->98 26 cmd.exe 15->26         started        100 Multi AV Scanner detection for dropped file 19->100 102 Creates autostart registry keys with suspicious values (likely registry only malware) 19->102 104 Creates multiple autostart registry keys 19->104 28 13.exe 19->28         started        106 Detected unpacking (changes PE section rights) 21->106 108 Tries to detect virtualization through RDTSC time measurements 21->108 110 Contains functionality to detect sleep reduction / modifications 21->110 32 2.exe 21->32         started        88 telete.in 195.201.225.248, 443, 49714, 49715 HETZNER-ASDE Germany 23->88 90 nodejs.org 104.20.22.46, 443, 49712 CLOUDFLARENETUS United States 23->90 72 C:\Users\user\AppData\Roaming\feeed.exe, PE32 23->72 dropped 74 C:\Users\user\...\configure, Bourne-Again 23->74 dropped 76 C:\Users\user\...\npx-cli.js, a 23->76 dropped 78 7 other files (none is malicious) 23->78 dropped 112 Detected unpacking (overwrites its own PE header) 23->112 114 Tries to detect Any.run 23->114 116 3 other signatures 23->116 34 cmd.exe 23->34         started        36 3.exe 23->36         started        39 icacls.exe 1 23->39         started        41 2 other processes 23->41 file9 signatures10 process11 dnsIp12 43 conhost.exe 26->43         started        45 mode.com 26->45         started        62 C:\Users\user\AppData\...\Styltendeschris.exe, PE32 28->62 dropped 126 Tries to detect Any.run 28->126 128 Modifies the context of a thread in another process (thread injection) 32->128 47 reg.exe 34->47         started        50 conhost.exe 34->50         started        86 ffvgdsv.ug 36->86 52 conhost.exe 39->52         started        file13 signatures14 process15 signatures16 130 Creates autostart registry keys with suspicious names 47->130 132 Creates multiple autostart registry keys 47->132 134 Creates an autostart registry key pointing to binary in C:\Windows 47->134
Threat name:
Win32.Infostealer.Racealer
Status:
Malicious
First seen:
2020-05-31 23:25:18 UTC
File Type:
PE (Exe)
Extracted files:
3
AV detection:
37 of 48 (77.08%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
formbook netwirerc guloader
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:agenttesla family:danabot family:dharma family:formbook agilenet banker botnet coreentity cryptone evasion keylogger packer persistence ransomware rat rezer0 spyware stealer trojan
Behaviour
Suspicious behavior: CmdExeWriteProcessMemorySpam
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Modifies registry class
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetThreadContext
Drops file in System32 directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Adds Run key to start application
Maps connected drives based on registry
Loads dropped DLL
Obfuscated with Agile.Net obfuscator
Checks BIOS information in registry
Drops startup file
Executes dropped EXE
Looks for VMWare Tools registry key
AgentTesla Payload
CryptOne packer
Formbook Payload
rezer0
Looks for VirtualBox Guest Additions in registry
AgentTesla
CoreEntity .NET Packer
Danabot
Danabot x86 payload
Formbook
Dharma
Malware Config
C2 Extraction:
http://www.worstig.com/w9z/
http://www.joomlas123.com/i0qi/
http://www.norjax.com/app/
92.204.160.54
2.56.213.179
45.153.186.47
93.115.21.29
185.45.193.50
193.34.166.247
Unpacked files
SH256 hash:
7570a7a6830ade05dcf862d5862f12f12445dbd3c0ad7433d90872849e11c267
MD5 hash:
af8e86c5d4198549f6375df9378f983c
SHA1 hash:
7ab5ed449b891bd4899fba62d027a2cc26a05e6f
SH256 hash:
02aa037d4791c78adbb3346cd823a622e5884c6b2fa63fca58fdaa23d97dd83c
MD5 hash:
39d26a80d0315131a2a5a1911ed67565
SHA1 hash:
7baece9cb040242fcb6a2002a39c12db3223a03c
SH256 hash:
c77ed65face9c444266998f11715af4d48ca4af7090e68d8a956cf0a7623fa37
MD5 hash:
7aeb2f128c5317ea1fdde5bdef2ab6b0
SHA1 hash:
6767e5d425ebc91e17c05518cc45eaa9eedd9386
SH256 hash:
8192b26ddce13aa3ecba25c1d717362d2a4d3426851f46202142cff94e03e768
MD5 hash:
a7571f60d48e19f0d1a5c1a02a0e8cd4
SHA1 hash:
6bce002d112a925b25e246d6ada77058e3d6de4f
SH256 hash:
2cc2742ec0b33c7c192b53ddc99dc736faf5df4c28d98ddba13cc73e71509f26
MD5 hash:
76dfed9907825696529b3ac0813b97f6
SHA1 hash:
74776a97fc16c8c227e051a521e5c4493a807549
SH256 hash:
fbda07122e6e05ba572251afee266417dcc5af77545abcfdba551c4c34c80011
MD5 hash:
672ff5db9e4d31e90515ce92f2a8d766
SHA1 hash:
d066676b22b70c64a6b037ccd656b8912d428ef9
SH256 hash:
635886f7a2d13eb59361afa10e4f1909d29f48d8d276a9143150fab5865b3e6f
MD5 hash:
898d714bb0d51abf04ce07c7d0322855
SHA1 hash:
b78e6d71b48c1101be405ad33d7d04b224636eac
SH256 hash:
59d84c51f021776101f7d4620d9171dc3ac3ead2999404a7eff085383c5f85e8
MD5 hash:
db232995d1a9541bb6d1c689ff85dcef
SHA1 hash:
81aed68d2e8b39482caf84d22f9327dd03605fb4
SH256 hash:
35919a153fc356d868fa804f04d53e2e56fe845dac2269954f85397ae706df13
MD5 hash:
cd4f2929566c04acb0158828432c4c86
SHA1 hash:
0a1d1b757389fbaf4cff704f828f485f2b04d6a9
SH256 hash:
091ff5f5bab1cbb2d27a32fedaff1f64dd4004e4a68665e8d606e28585d928a8
MD5 hash:
9d4da0e623bb9bb818be455b4c5e97d8
SHA1 hash:
9bc2079b5dd2355f4d98a2fe9879b5db3f2575b0
SH256 hash:
9187706072f008a27c26421791f57ec33a59b44b012500b2db3eeb48136fb2da
MD5 hash:
bf15960dd7174427df765fd9f9203521
SHA1 hash:
cb1de1df0c3b1a1cc70a28629ac51d67901b17aa
SH256 hash:
79869f889893572b00e47726e2e93dce45ef5062c48ccb9c809e93d1d1f78c2f
MD5 hash:
a0843dd63be96d783e836ff293ecf6ca
SHA1 hash:
3b98a4e745219faa7c9032c33a771178a8d5cc3f
Detections:
win_raccoon_a0 win_raccoon_auto
SH256 hash:
71049e35d5cf447c59c11e7eb128467b4dc6a3d2d52486eba9e883f5af7cad4f
MD5 hash:
17f6f5e37ead8f8586b71d7267882f42
SHA1 hash:
68c5a09494ae81c9809c51830139c155cbf9b65b
SH256 hash:
6ab93c94a8f8509bd4edb7fed3ea63b6dae6c049a1b27a6d363178ba12ab2415
MD5 hash:
b3e435fbe42c557b7a7edb8223ead7c0
SHA1 hash:
3b0fdf6be746e31ce57a32ed623af6a4cbba34af
SH256 hash:
3dd04af3ff4f31e7fb351439c03cd7d29bc2d2cbeab3067678cede03c9bb56b3
MD5 hash:
94d491195bbdbc03ad54a7b9385f33f9
SHA1 hash:
20d3a05c7c664d695ebcc2bbb239ef07c84f47ac
SH256 hash:
7766fa0dfefeff9d210da3dbc7050eb31ccb7188e66d3a029783da5774722ff5
MD5 hash:
c04f6ec0a7b95c4b56e6fe82d85e3c1a
SHA1 hash:
51e3f404120e986dbc8b0205d4973f49f26d724d
SH256 hash:
1d41283c4cb970fd9c17936b952665f3b4243be89d18b7059ae3866ed3bc4dac
MD5 hash:
6489f6016b086d2952399f3cd3fd6965
SHA1 hash:
3e7bd777b1c7ab6e77b90cdc1abf7165321bc4af
SH256 hash:
0eedcbdbc05a80624f342ef91a32bde1e357158c78512edce1bf231fdea7c92a
MD5 hash:
d1942f2d326cee5d4f8378583ead05b5
SHA1 hash:
44b3d68fff6d8aab434509e0cdb03196b92dcca2
SH256 hash:
5158aecf8d0ccaa1de66ccd721a0415e24e8f92ce649325e13abdc4bf940d616
MD5 hash:
78142b0b30889d9b163d30b685fd8b4b
SHA1 hash:
88692d10853901e47679617e2bcc3a26c2101016
SH256 hash:
df463be6248e3f5ea64c6739e0726bda411b17ab5d660564da366c5ec6e3ffd2
MD5 hash:
6e42c9b75bc9a4c473c5c7f2cbb69695
SHA1 hash:
aa6894f786846b747879eb0bfb10986f91236d98
Detections:
win_isfb_auto
SH256 hash:
77046830eff25b93f7a32f764d73affc25bfcacfebbaaa0c0697902f452d043f
MD5 hash:
49712ea04835968122d35c06dff8bc6d
SHA1 hash:
9a93b097782683894050867bed1ee9853d7ccfa9
SH256 hash:
4e36dc0d37ead94cbd7797668c3c240ddc00fbb45c18140d370c868915b8469d
MD5 hash:
ec7506c2b6460df44c18e61d39d5b1c0
SHA1 hash:
7c3e46cd7c93f3d9d783888f04f1607f6e487783
SH256 hash:
8ec9516ac0a765c28adfe04c132619170e986df07b1ea541426be124fb7cfd2c
MD5 hash:
dea5598aaf3e9dcc3073ba73d972ab17
SHA1 hash:
51da8356e81c5acff3c876dffbf52195fe87d97f
Detections:
win_agent_tesla_w1
SH256 hash:
33f77b1bca36469dd734af67950223a7b1babd62a25cb5f0848025f2a68b9447
MD5 hash:
ea88f31d6cc55d8f7a9260245988dab6
SHA1 hash:
9e725bae655c21772c10f2d64a5831b98f7d93dd
SH256 hash:
c7d8c3c379dcc42fa796b07b6a9155826d39cbd2f264bc68d22a63b17c8ef7df
MD5 hash:
48e9df7a479e3fd63064ec66e2283a45
SHA1 hash:
a8dcce44de655a97a3448758b397a37d1f7db549
SH256 hash:
d7479a2f9f080742d17077fb4ccfc24583fa7a35842ba505cd43ed266734ce1f
MD5 hash:
c3da5cb8e079024e6d554be1732c51cf
SHA1 hash:
e8f4499366fe67c9ae6fd1f5acbf56a9b956d4c3
SH256 hash:
de30d86cff3d838162aa88112a946dfb3af84005dda6bbc70cee15e8dff70ba3
MD5 hash:
0009efe13eaf4dd3d091bc6e9ca7c1e7
SHA1 hash:
f2be84149784db1d1b7746afde07d781805bd35f
SH256 hash:
f5b2489109d68b6ac83b453b8df1c7e1e9ec2636e162efdbaab4d27c1ce2dd69
MD5 hash:
fc44b935b0188657684c40113f7ab81c
SHA1 hash:
76c4a1262eb49daa55a24aadd7e3a48f2c22abd2
SH256 hash:
4fcbfc4bb0aa845ee76d11bbff9cf306f4cf21b5db748fb6962dadfad56b1103
MD5 hash:
933b6f7782d586d670ff227869806d1d
SHA1 hash:
1d22cefcfca1c6019df9d1919e31a6c3b76c6462
SH256 hash:
1b30e8d422017aa4eee1410b55d9ca60bdb4ddd96b66758e3a3088f9f03d8336
MD5 hash:
a80023d0d9acd1d8baa719de3c9f3f9d
SHA1 hash:
68793e8e378e36b1775fb5882b0b7b1aaf456ddc
SH256 hash:
6e94d3590f78e9dba6182b2afe3a69837aeed06b875c85e872ff351562578923
MD5 hash:
3466c4dbe9016c7626a401c8373b20c3
SHA1 hash:
898937235bbd8049927dc3bc2aa3dd82399093c7
SH256 hash:
b7d073d8d7ad90f4ca2e285f156ee2a56f8ec87ec7102c9c38e905b4d36e71db
MD5 hash:
eaacee0391fff0bf625d28191b6848c1
SHA1 hash:
d3fc795bb7501690610c90201e48f72f920a488a
SH256 hash:
62e5029c5cb34da0c97d30beeae4499eced256d86fbc15af810378f1b435a1e8
MD5 hash:
b93861ed5cd42a85be441951a93f0521
SHA1 hash:
d7080889abe329042a64b7743e472986f45d77ff
SH256 hash:
307077d1a3fd2b53b94d88268e31b0b89b8c0c2ee9dbb46041d3e2395243f1b3
MD5 hash:
56ba37144bd63d39f23d25dae471054e
SHA1 hash:
088e2aff607981dfe5249ce58121ceae0d1db577
Detections:
win_dharma_auto
SH256 hash:
6dc883dd39d816b3c4788ffd318297cd2c4411efed851164f314720616d53638
MD5 hash:
9815e58aed2240fa7212d6714b0f3fe7
SHA1 hash:
820b2eacca357dd12594971228fdd214856ff99e
Detections:
win_agent_tesla_w1
SH256 hash:
26c5a886c0c74609119ed9f92294f02937da6b21c1d773c4966125e719faa75a
MD5 hash:
3937c8d6aafbf2a752161896be557640
SHA1 hash:
e971a634f5f0916f3a36584a6b1873bff526b55f
SH256 hash:
1c061531ae5d12a4828bcad8aee4aee1e4d3e40f68b06057c7336560770fd363
MD5 hash:
7029e0a6be6cd0d0e4b551beb5b1adce
SHA1 hash:
6d03d5bbdfa81ce4f639904454341efec99383dc
SH256 hash:
40d07694e7bb1d782b4aaf7318cee57738005bc20aedbd21c0a5af1d9aa01efc
MD5 hash:
569099fe9a735e973a1efd205380b81c
SHA1 hash:
d4044de4eb1ac9992c4d4b7b2a839aace6685879
SH256 hash:
fa00ac5c9d4da3ff608a77f255fd3cb486556aa8f9820237e5d73342b481cac4
MD5 hash:
e536c4f03df98ca33c3cb088f942c014
SHA1 hash:
235fb637894b210946f9668ff8c966f48fb20d71
Detections:
win_danabot_auto
SH256 hash:
e714db44e58c4cf2a3fd8b19ab853064226d73a4100894253b9fd3051efe7839
MD5 hash:
7d2cd50a3fdea5b95119a1d3ec2c17a7
SHA1 hash:
ee35bc7011a4de9cbaa4599b1b91800685a4266b
Detections:
win_agent_tesla_w1
SH256 hash:
163cedd57b05ca2eda095a6ce1734e5c5ce80623c73eecf2ea9085bbeb65cd7d
MD5 hash:
dfff608f858512345b5e15c9b1b1210f
SHA1 hash:
102f02b9a017e6e28c3783fada9c033cd8dcad12
SH256 hash:
fa8dd6cb9d9a8307b65624ffa7444b9f9aa18a98a6579dd10e31d3cf69869242
MD5 hash:
9ce567f5c275494b346d6fcd4aa25c87
SHA1 hash:
960f5995bc79a4c4fb4093e0f4105080fa31f0ef
SH256 hash:
e62def65a391ed0ff82faac5792418eef7b7be30af75f9e44a524083761bb013
MD5 hash:
81e823e795d47c8b11531d7dad327592
SHA1 hash:
13d3af234c86d8712a58c242d2d902af94f855ec
SH256 hash:
b2a497dc3b72879ff33a0031e3f9987c416ba73a04f624b0c57c940f35fc95a2
MD5 hash:
b121203403a33ad5236dbdee31b83d72
SHA1 hash:
a4dedd1f415cf64edb09a13167a09367ba48bbed
Detections:
win_agent_tesla_w1
SH256 hash:
8f87e5c94d152326fbb1030236d778d4b33dfb5b1399a0372edeb879ea335ada
MD5 hash:
27ec13ad9bb78ed11755b1968ce0ff83
SHA1 hash:
6476e024687ddf81243c0d886508ca308a830bc5
Detections:
win_agent_tesla_w1
SH256 hash:
dbe95b94656eb0173998737fb5e733d3714c8e3b58226a1a038ca85257c8b064
MD5 hash:
3d2c6861b6d0899004f8abe7362f45b7
SHA1 hash:
33855b9a9a52f9183788b169cc5d57e6ad9da994
SH256 hash:
d268b282fc50ba7929f205dd2cc32ebe0ae4c53c80e1c7e769298b40a49c4502
MD5 hash:
9c98b4eb153dc94a9192cceb59698383
SHA1 hash:
04389c588585e1d031fb4d7245586cd31e2f3491
Detections:
win_qakbot_auto
SH256 hash:
f1ac463cac24138a6428efe6f69123da5b7684a54207d420f80cfb0176244861
MD5 hash:
108370d4539d2a8b8daf3033081f823d
SHA1 hash:
e726686b2488229571f087c2abdbb4251b8358cb
Detections:
win_qakbot_g0 win_qakbot_auto
SH256 hash:
63dde36d5f911dcd3bafc4680c02e5e2952c1e092eedbfa68b95bbe5a7c98d2e
MD5 hash:
7e7e474da06d99bed1b6406a9802503c
SHA1 hash:
e4b5071e6f496128c2efbc8c9e82d131dd264c1d
Detections:
win_formbook_g0 win_formbook_auto
SH256 hash:
a1d957cbc899d714ad8b3702a315475111f106952bd632d7db1dc6655f41e3bd
MD5 hash:
1ce8cfd7a1794b9f4414ca73d58eb7c7
SHA1 hash:
f460803c1b4cff1ee6065aacd07d4cfa79cf193b
Detections:
win_formbook_g0 win_formbook_auto
SH256 hash:
61f638ac8bed097e0e73e2563191f12cbba16cec020a39524ce0019437ef3801
MD5 hash:
a52bfc3bcea838a9c5b72c57b1cfc47a
SHA1 hash:
a08a3334c3542fac50c6509c9e78164d22601a5a
Detections:
win_formbook_g0 win_formbook_auto
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments