MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 78f2c94c64775acc935a40cf63103e04ed2ace67a20e8eb533f4a3c2f40d2fe9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
GuLoader
Vendor detections: 4
| SHA256 hash: | 78f2c94c64775acc935a40cf63103e04ed2ace67a20e8eb533f4a3c2f40d2fe9 |
|---|---|
| SHA3-384 hash: | 0f82b7afee62a185cdac807025a2b836e40c1c0555a45ef9a52f3cfde83168a78083c771f02eee9edcb113f1cfa805f3 |
| SHA1 hash: | cb8d07879b6c34839c8a473599b7801e13458773 |
| MD5 hash: | 75adea927ed8d5eedb84e8771edd7acd |
| humanhash: | mike-avocado-wolfram-network |
| File name: | BANK_COP.EXE |
| Download: | download sample |
| Signature | GuLoader |
| File size: | 66'776 bytes |
| First seen: | 2020-04-30 11:19:36 UTC |
| Last seen: | 2020-05-11 07:06:40 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 17d07931403e3faa31647e7dff7bb969 (1 x GuLoader) |
| ssdeep | 768:yOGN0vnK8vYvSSyYNbVy9J8RRVgr+ceWdK/q0tGQ471ozhQ5oyb+DSPGoumDGpYZ:yZ+K8fIbVywjgr+0dpbQ47kQSybso5 |
| Threatray | 451 similar samples on MalwareBazaar |
| TLSH | B6638D9BB18AF213D6465830687393952D23EDA98AD94423FDB0F3684DF3B5024F6F19 |
| Reporter | |
| Tags: | exe GuLoader |
Code Signing Certificate
| Organisation: | Dummy |
|---|---|
| Issuer: | Dummy |
| Algorithm: | sha256WithRSAEncryption |
| Valid from: | Jan 1 07:00:00 2013 GMT |
| Valid to: | Jan 2 07:00:00 2013 GMT |
| Serial number: | 7E89B9DF006BD1AA4C48D865039634CA |
| Intelligence: | 2 malware samples on MalwareBazaar are signed with this code signing certificate |
| Thumbprint Algorithm: | SHA256 |
| Thumbprint: | 46EF45463A9E9A92A203BB0FB866206D659EC986B32832D907C7D7DAD62C69CC |
| Source: | This information was brought to you by ReversingLabs A1000 Malware Analysis Platform |
abuse_ch
Malspam distributing GuLoader:HELO: raysen.com.cn
Sending IP: 216.244.74.66
From: sales@raysen.com.cn
Subject: Re:Orders With Image Specifications
Attachment: Order Image spec.img (contains "BANK_COP.EXE")
Intelligence
File Origin
# of uploads :
2
# of downloads :
90
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Injector
Status:
Malicious
First seen:
2020-03-16 02:57:00 UTC
File Type:
PE (Exe)
Extracted files:
6
AV detection:
25 of 31 (80.65%)
Threat level:
5/5
Detection(s):
Malicious file
Verdict:
malicious
Label(s):
guloader
Similar samples:
+ 441 additional samples on MalwareBazaar
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_NX | Missing Non-Executable Memory Protection | critical |
| CHECK_PIE | Missing Position-Independent Executable (PIE) Protection | high |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| VB_API | Legacy Visual Basic API used | MSVBVM60.DLL::EVENT_SINK_AddRef |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.