MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 78f2c94c64775acc935a40cf63103e04ed2ace67a20e8eb533f4a3c2f40d2fe9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 78f2c94c64775acc935a40cf63103e04ed2ace67a20e8eb533f4a3c2f40d2fe9
SHA3-384 hash: 0f82b7afee62a185cdac807025a2b836e40c1c0555a45ef9a52f3cfde83168a78083c771f02eee9edcb113f1cfa805f3
SHA1 hash: cb8d07879b6c34839c8a473599b7801e13458773
MD5 hash: 75adea927ed8d5eedb84e8771edd7acd
humanhash: mike-avocado-wolfram-network
File name:BANK_COP.EXE
Download: download sample
Signature GuLoader
File size:66'776 bytes
First seen:2020-04-30 11:19:36 UTC
Last seen:2020-05-11 07:06:40 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 17d07931403e3faa31647e7dff7bb969 (1 x GuLoader)
ssdeep 768:yOGN0vnK8vYvSSyYNbVy9J8RRVgr+ceWdK/q0tGQ471ozhQ5oyb+DSPGoumDGpYZ:yZ+K8fIbVywjgr+0dpbQ47kQSybso5
Threatray 451 similar samples on MalwareBazaar
TLSH B6638D9BB18AF213D6465830687393952D23EDA98AD94423FDB0F3684DF3B5024F6F19
Reporter abuse_ch
Tags:exe GuLoader

Code Signing Certificate

Organisation:Dummy
Issuer:Dummy
Algorithm:sha256WithRSAEncryption
Valid from:Jan 1 07:00:00 2013 GMT
Valid to:Jan 2 07:00:00 2013 GMT
Serial number: 7E89B9DF006BD1AA4C48D865039634CA
Intelligence: 2 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: 46EF45463A9E9A92A203BB0FB866206D659EC986B32832D907C7D7DAD62C69CC
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform


Avatar
abuse_ch
Malspam distributing GuLoader:

HELO: raysen.com.cn
Sending IP: 216.244.74.66
From: sales@raysen.com.cn
Subject: Re:Orders With Image Specifications
Attachment: Order Image spec.img (contains "BANK_COP.EXE")

Intelligence


File Origin
# of uploads :
2
# of downloads :
90
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Injector
Status:
Malicious
First seen:
2020-03-16 02:57:00 UTC
File Type:
PE (Exe)
Extracted files:
6
AV detection:
25 of 31 (80.65%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

GuLoader

Executable exe 78f2c94c64775acc935a40cf63103e04ed2ace67a20e8eb533f4a3c2f40d2fe9

(this sample)

  
Delivery method
Distributed via e-mail attachment

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
VB_APILegacy Visual Basic API usedMSVBVM60.DLL::EVENT_SINK_AddRef

Comments