MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 7a7760c4a4b1244950ea0fd475c53005ced18cb314a2e0fc4499086582e1a5aa. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
GuLoader
Vendor detections: 5
| SHA256 hash: | 7a7760c4a4b1244950ea0fd475c53005ced18cb314a2e0fc4499086582e1a5aa |
|---|---|
| SHA3-384 hash: | 5dea963a0439094ad7317d36a12ac347aee5b5849e6a6af17317dc19e643bf6bb4fa9b02e0f0baac813b42d8a527942d |
| SHA1 hash: | 8ddbd928e31d2f95bb1af5759992b0d24b4a74a3 |
| MD5 hash: | c5ef08e0962183b76209c8ad5866353b |
| humanhash: | speaker-two-mike-tennis |
| File name: | gunzipped |
| Download: | download sample |
| Signature | GuLoader |
| File size: | 114'688 bytes |
| First seen: | 2020-06-04 06:02:57 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | d2b54019951457354a020269e7a1d204 (1 x GuLoader) |
| ssdeep | 1536:J9JSPfxV40NJWk7aXeukgrKHxLdGKc+o0FDHdZ1gIF0hRoMkgMJV1kpaF:YPXNJXaXegKVdhjFD9zmeJ4a |
| Threatray | 1'671 similar samples on MalwareBazaar |
| TLSH | 54B37B03EC8D8653D1458BBD3D1A8DB97A1CB91D09005FDF6139AE9FAD326422C9721F |
| Reporter | |
| Tags: | DHL GuLoader |
abuse_ch
Malspam distributing GuLoader:HELO: mail0.467.celumltd.casa
Sending IP: 206.189.46.179
From: DHL Express <service@dhl.com>
Subject: DHL Consignment Details
Attachment: DHL Consignment Details_pdf.gz (contains "gunzipped")
GuLoader payload URL:
https://drive.google.com/uc?export=download&id=1bLoTtOXDaHzrhrr6SdwfOHy2EToX25WE
Intelligence
File Origin
# of uploads :
1
# of downloads :
66
Origin country :
n/a
Vendor Threat Intelligence
Detection:
Lokibot
Gathering data
Threat name:
Win32.Trojan.Fareit
Status:
Malicious
First seen:
2020-06-03 23:33:23 UTC
AV detection:
22 of 31 (70.97%)
Threat level:
2/5
Detection(s):
Malicious file
Verdict:
malicious
Label(s):
guloader
Similar samples:
+ 1'661 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
5/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of NtSetInformationThreadHideFromDebugger
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.