MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 75ef5c2c26d3ccc5719073b3a6f2e1a3124843ef91bf5b65f7afdab4a90f9d8d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 10


Intelligence 10 IOCs YARA 1 File information Comments

SHA256 hash: 75ef5c2c26d3ccc5719073b3a6f2e1a3124843ef91bf5b65f7afdab4a90f9d8d
SHA3-384 hash: 0950304a125f4e41dfacf5ef0d1a7787bf0b88f3daead6ad4fb5d5dc53b3ebb83a4a38e4150e2c3e761ef2bfd872a48e
SHA1 hash: 1f87157d8d29b9d40b0e1ad6eb4617ba684c8f1a
MD5 hash: 25ba729a1538d68ad33fe36ca0548181
humanhash: black-earth-undress-magnesium
File name:ORDER#4510093083_PO_NEW_MATERIAL_JAN_2024.exe
Download: download sample
Signature GuLoader
File size:485'576 bytes
First seen:2024-01-29 06:53:40 UTC
Last seen:2024-01-29 08:28:38 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 7ed0d71376e55d58ab36dc7d3ffda898 (133 x GuLoader, 28 x RemcosRAT, 23 x AgentTesla)
ssdeep 12288:6a7r+1Jt7W+FFqQ5xrW2nPD4EdaMAboDO:Fr+1T7W+7q+CCP8DqO
TLSH T1D3A40153FA2C4B9FE78A8AB23C7D06B56A589F5319106C02B6C4FE2D853234DED026D5
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon e2ee8a8eb6d8ecf4 (56 x AgentTesla, 39 x RemcosRAT, 38 x GuLoader)
Reporter Anonymous
Tags:exe GuLoader signed

Code Signing Certificate

Organisation:Oromo
Issuer:Oromo
Algorithm:sha256WithRSAEncryption
Valid from:2023-12-28T01:42:42Z
Valid to:2026-12-27T01:42:42Z
Serial number: 4e8b82acd8f08114a39cb6433690522e26b25387
Thumbprint Algorithm:SHA256
Thumbprint: a2376256e540f957e658324086cfa56e3ed703558f330ae7bcf525d2da7a07c2
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
342
Origin country :
CH CH
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Creating a window
Creating a file
Creating a file in the %temp% subdirectories
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
installer lolbin masquerade overlay packed shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
GuLoader, Remcos
Detection:
malicious
Classification:
troj.evad.phis.spyw
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Creates autostart registry keys with suspicious names
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Initial sample is a PE file and has a suspicious name
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sample uses process hollowing technique
Sigma detected: Remcos
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected GuLoader
Yara detected Remcos RAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1382489 Sample: ORDER#4510093083_PO_NEW_MAT... Startdate: 29/01/2024 Architecture: WINDOWS Score: 100 57 geoplugin.net 2->57 71 Antivirus detection for dropped file 2->71 73 Antivirus / Scanner detection for submitted sample 2->73 75 Multi AV Scanner detection for dropped file 2->75 77 5 other signatures 2->77 10 ORDER#4510093083_PO_NEW_MATERIAL_JAN_2024.exe 3 35 2->10         started        13 vexplorers.exe 2->13         started        15 vexplorers.exe 23 2->15         started        17 2 other processes 2->17 signatures3 process4 file5 47 C:\Users\user\AppData\Local\...\System.dll, PE32 10->47 dropped 19 ORDER#4510093083_PO_NEW_MATERIAL_JAN_2024.exe 3 12 10->19         started        49 C:\Users\user\AppData\Local\...\System.dll, PE32 13->49 dropped 24 vexplorers.exe 13->24         started        51 C:\Users\user\AppData\Local\...\System.dll, PE32 15->51 dropped 53 C:\Users\user\AppData\Local\...\System.dll, PE32 17->53 dropped process6 dnsIp7 59 96.47.233.26, 50243, 50244, 50249 JAZZ-NETWORKUS United States 19->59 43 C:\Users\user\AppData\...\Insistere.exe, PE32 19->43 dropped 45 C:\ProgramData\vexplorers\vexplorers.exe, PE32 19->45 dropped 79 Creates autostart registry keys with suspicious names 19->79 81 Creates multiple autostart registry keys 19->81 26 vexplorers.exe 23 19->26         started        file8 signatures9 process10 file11 55 C:\Users\user\AppData\Local\...\System.dll, PE32 26->55 dropped 83 Antivirus detection for dropped file 26->83 85 Multi AV Scanner detection for dropped file 26->85 87 Detected unpacking (changes PE section rights) 26->87 30 vexplorers.exe 5 16 26->30         started        signatures12 process13 dnsIp14 61 geoplugin.net 178.237.33.50, 50248, 80 ATOM86-ASATOM86NL Netherlands 30->61 63 72.11.158.94, 1604, 50245, 50246 ASN-QUADRANET-GLOBALUS United States 30->63 89 Tries to harvest and steal browser information (history, passwords, etc) 30->89 91 Writes to foreign memory regions 30->91 93 Maps a DLL or memory area into another process 30->93 95 Sample uses process hollowing technique 30->95 34 vexplorers.exe 30->34         started        37 vexplorers.exe 30->37         started        39 vexplorers.exe 30->39         started        41 15 other processes 30->41 signatures15 process16 signatures17 65 Tries to steal Instant Messenger accounts or passwords 34->65 67 Tries to steal Mail credentials (via file / registry access) 34->67 69 Tries to harvest and steal browser information (history, passwords, etc) 37->69
Threat name:
Win32.Trojan.Guloader
Status:
Malicious
First seen:
2024-01-28 17:10:29 UTC
File Type:
PE (Exe)
Extracted files:
8
AV detection:
15 of 24 (62.50%)
Threat level:
  5/5
Verdict:
unknown
Result
Malware family:
Score:
  10/10
Tags:
family:guloader family:remcos botnet:2024 collection downloader persistence rat spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Windows directory
Suspicious use of NtCreateThreadExHideFromDebugger
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses Microsoft Outlook accounts
Adds Run key to start application
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
NirSoft MailPassView
NirSoft WebBrowserPassView
Nirsoft
Guloader,Cloudeye
Remcos
Malware Config
C2 Extraction:
72.11.158.94:1604
Unpacked files
SH256 hash:
4ff9b2678d698677c5d9732678f9cf53f17290e09d053691aac4cc6e6f595cbe
MD5 hash:
3e6bf00b3ac976122f982ae2aadb1c51
SHA1 hash:
caab188f7fdc84d3fdcb2922edeeb5ed576bd31d
SH256 hash:
75ef5c2c26d3ccc5719073b3a6f2e1a3124843ef91bf5b65f7afdab4a90f9d8d
MD5 hash:
25ba729a1538d68ad33fe36ca0548181
SHA1 hash:
1f87157d8d29b9d40b0e1ad6eb4617ba684c8f1a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:PE_Digital_Certificate
Author:albertzsigovits

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

GuLoader

Executable exe 75ef5c2c26d3ccc5719073b3a6f2e1a3124843ef91bf5b65f7afdab4a90f9d8d

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments