MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7a55e4b3f800275bc0f7c00cd337d0dd83379ef845fce3fa55b86d68092c1b9c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments

SHA256 hash: 7a55e4b3f800275bc0f7c00cd337d0dd83379ef845fce3fa55b86d68092c1b9c
SHA3-384 hash: 4667d8396b23f0b4609f3609f48fe4ee66dbb5ddd97c079af347220c2ddf2bf455c30d6b3ae3bda3a114679a245d3271
SHA1 hash: 7497b8c739994f003d248b8bd2a62d526c1b902d
MD5 hash: cad1eb405fa1ac324c712c9090e0c08f
humanhash: yankee-batman-king-florida
File name:ΠΑΡΑΚΟΛΟΥΘΗΣΗ ΔΕΜΑΤΩΝ DHL.exe
Download: download sample
Signature GuLoader
File size:509'598 bytes
First seen:2023-07-12 06:20:44 UTC
Last seen:2023-07-12 06:43:33 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 1f23f452093b5c1ff091a2f9fb4fa3e9 (282 x GuLoader, 37 x RemcosRAT, 27 x VIPKeylogger)
ssdeep 12288:sC3+YT7k0PwTrVg0iTYYXQZbnnTOnVm4j5VyP+:sa+YHL41ghXA9iVm4j5M+
Threatray 2'253 similar samples on MalwareBazaar
TLSH T1D0B4012636D4E40BC1711BB0CA21A1F7CBACAD84FC70528B3679BF6C75BC19276593A4
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter abuse_ch
Tags:exe GuLoader

Intelligence


File Origin
# of uploads :
2
# of downloads :
249
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
formbook
ID:
1
File name:
ΠΑΡΑΚΟΛΟΥΘΗΣΗ ΔΕΜΑΤΩΝ DHL.exe
Verdict:
Malicious activity
Analysis date:
2023-07-12 06:21:52 UTC
Tags:
formbook xloader trojan

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a window
Creating a file
Creating a process from a recently created file
Launching a process
Sending an HTTP GET request
Modifying a system file
Gathering data
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
GuLoader
Detection:
malicious
Classification:
troj.evad
Score:
80 / 100
Signature
Found suspicious powershell code related to unpacking or dynamic code loading
Multi AV Scanner detection for submitted file
Suspicious powershell command line found
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Very long command line found
Writes to foreign memory regions
Yara detected GuLoader
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1271442 Sample: 039d_DHL.exe Startdate: 12/07/2023 Architecture: WINDOWS Score: 80 27 Multi AV Scanner detection for submitted file 2->27 29 Yara detected GuLoader 2->29 31 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 2->31 8 039d_DHL.exe 6 34 2->8         started        process3 file4 25 C:\Users\user\AppData\Local\...\enleaf.Gon, ASCII 8->25 dropped 35 Suspicious powershell command line found 8->35 12 powershell.exe 10 8->12         started        signatures5 process6 signatures7 37 Very long command line found 12->37 39 Found suspicious powershell code related to unpacking or dynamic code loading 12->39 15 powershell.exe 10 12->15         started        18 conhost.exe 12->18         started        process8 signatures9 41 Writes to foreign memory regions 15->41 43 Tries to detect Any.run 15->43 20 ielowutil.exe 15->20         started        23 ielowutil.exe 15->23         started        process10 signatures11 33 Tries to detect Any.run 20->33
Threat name:
Win32.PUA.Leonem
Status:
Malicious
First seen:
2023-07-11 18:42:36 UTC
File Type:
PE (Exe)
Extracted files:
4
AV detection:
9 of 24 (37.50%)
Threat level:
  1/5
Result
Malware family:
guloader
Score:
  10/10
Tags:
family:formbook family:guloader campaign:il09 discovery downloader persistence rat spyware stealer trojan
Behaviour
Gathers network information
Modifies Internet Explorer settings
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Drops file in Windows directory
Suspicious use of NtCreateThreadExHideFromDebugger
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Adds Run key to start application
Checks installed software on the system
Checks QEMU agent file
Reads user/profile data of web browsers
Adds policy Run key to start application
Formbook payload
Formbook
Guloader,Cloudeye
Unpacked files
SH256 hash:
7a55e4b3f800275bc0f7c00cd337d0dd83379ef845fce3fa55b86d68092c1b9c
MD5 hash:
cad1eb405fa1ac324c712c9090e0c08f
SHA1 hash:
7497b8c739994f003d248b8bd2a62d526c1b902d
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

GuLoader

Executable exe 7a55e4b3f800275bc0f7c00cd337d0dd83379ef845fce3fa55b86d68092c1b9c

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments