MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 79f98a45cdf0776c1ae83a4b027ded395fe8dfc4b520f51706fc7207b1e4c630. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 79f98a45cdf0776c1ae83a4b027ded395fe8dfc4b520f51706fc7207b1e4c630
SHA3-384 hash: 172ec769ddd8fd2b26b40fdab5c3fc7519da7c7d5a71a0810a8430436025fb1fadf896400229ff75d3b2e73bf4d4d119
SHA1 hash: 907c618ff3c2dc8bfba72acf057b4feb1378e353
MD5 hash: 8797e981438dce682e3ebd74e5562861
humanhash: jersey-cola-tennessee-connecticut
File name:KOMMU.exe
Download: download sample
Signature GuLoader
File size:77'824 bytes
First seen:2020-06-08 09:33:07 UTC
Last seen:2020-06-08 11:12:28 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 7d3cd064a4a98102690418c1d93e969e (1 x GuLoader)
ssdeep 768:a9ysfNpuRnnPilTjATMe9hS4BIvIIA6YUpTkRXQJtEWx4Be3KO0NozTgB8nwbl:a9ysFY6TjMbLTOYUp0goKKvL
Threatray 976 similar samples on MalwareBazaar
TLSH 5773AE036C04C591F040C2B17E935B9A222A6F289D466E977A5E5FBFEC706C25DF123E
Reporter abuse_ch
Tags:CHN exe geo GuLoader


Avatar
abuse_ch
Malspam distributing GuLoader:

HELO: EUR04-HE1-obe.outbound.protection.outlook.com
Sending IP: 40.92.73.57
From: kassem agha <kasem_agha@hotmail.com>
Subject: 重新重新重新附加新订单19PG03083
Attachment: file.rar (contains "KOMMU.exe")

GuLoader payload URL:
https://drive.google.com/uc?export=download&id=1kpBuILdSIcw7QazEq8GvjbkN1kJGVxOw

Intelligence


File Origin
# of uploads :
2
# of downloads :
88
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Spyware.FormBook
Status:
Malicious
First seen:
2020-06-08 09:35:04 UTC
AV detection:
25 of 31 (80.65%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
Suspicious behavior: MapViewOfSection
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Legitimate hosting services abused for malware hosting/C2
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

GuLoader

Executable exe 79f98a45cdf0776c1ae83a4b027ded395fe8dfc4b520f51706fc7207b1e4c630

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments