MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 79f0258fb0f3f2379e0a0320a754686cbc9e4627240f03663276b6b724952fb9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: 79f0258fb0f3f2379e0a0320a754686cbc9e4627240f03663276b6b724952fb9
SHA3-384 hash: 5d0491e82d5e751c47411fe640c425615eeec916e8769ccc97b5e176099f8a2bc744e2c861aad3bf72637aa27b0c7b76
SHA1 hash: 7130f85040c7d43bb30bc532c1d585b07745eaa3
MD5 hash: da22f3ce3a7ba67f7367c74777a7479f
humanhash: orange-equal-august-illinois
File name:PO~no. 2K20-0093-VIT.exe
Download: download sample
Signature GuLoader
File size:464'192 bytes
First seen:2022-10-10 14:28:27 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash e221f4f7d36469d53810a4b5f9fc8966 (118 x GuLoader, 28 x RemcosRAT, 21 x Formbook)
ssdeep 6144:/tXZXwTR+upprYCaxpEDkjBbTEcgWyJ8Qk0KIP8t8pUed8EDpYV3cQ+OaLvwXsma:/tqsuHk+A5H68QJP8KprPiJ6Tz/t7
Threatray 14 similar samples on MalwareBazaar
TLSH T1F7A4EF21B699D4BEC85CC130DAB94AFA9D216D89D920068B3F3A7E5C3539643FA04773
TrID 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
16.4% (.EXE) Win64 Executable (generic) (10523/12/4)
10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.0% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter malwarelabnet
Tags:exe GuLoader signed

Code Signing Certificate

Organisation:
Issuer:
Algorithm:sha256WithRSAEncryption
Valid from:2022-09-20T23:51:54Z
Valid to:2025-09-19T23:51:54Z
Serial number: -72199178ba7c32c6
Thumbprint Algorithm:SHA256
Thumbprint: 95d9147a3f2e785a373849819a7f0508e6fbb5edbd2584d7de23de5d75c77608
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
288
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
PO~no. 2K20-0093-VIT.exe
Verdict:
Malicious activity
Analysis date:
2022-10-10 16:45:24 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %temp% directory
Creating a window
Creating a file in the %AppData% subdirectories
Sending a custom TCP request
Creating a file
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AgentTesla, GuLoader
Detection:
malicious
Classification:
troj.evad.spyw
Score:
100 / 100
Behaviour
Behavior Graph:
n/a
Threat name:
Win32.Trojan.Guloader
Status:
Malicious
First seen:
2022-10-10 01:24:22 UTC
File Type:
PE (Exe)
Extracted files:
8
AV detection:
16 of 26 (61.54%)
Threat level:
  5/5
Result
Malware family:
guloader
Score:
  10/10
Tags:
family:guloader discovery downloader
Behaviour
Enumerates physical storage devices
Checks installed software on the system
Loads dropped DLL
Guloader,Cloudeye
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
ab4aa2dfafe6e48eb92df806c74b554188d11611b2551bc777e1eeb197b8430d
MD5 hash:
3e7922543bd91e60c2293959b1a8ef14
SHA1 hash:
ba8e2fc639328edb6f56a4a2b45f6d006a8ca233
SH256 hash:
5a1c20a3e2e2eb182976977669f2c5d9f3104477e98f74d69d2434e79b92fdc3
MD5 hash:
7399323923e3946fe9140132ac388132
SHA1 hash:
728257d06c452449b1241769b459f091aabcffc5
SH256 hash:
79f0258fb0f3f2379e0a0320a754686cbc9e4627240f03663276b6b724952fb9
MD5 hash:
da22f3ce3a7ba67f7367c74777a7479f
SHA1 hash:
7130f85040c7d43bb30bc532c1d585b07745eaa3
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments