MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 7c993072655d3846fd0fa15c1370d2e784eddc45a0204e281e8b05dfceda6ece. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
GuLoader
Vendor detections: 4
| SHA256 hash: | 7c993072655d3846fd0fa15c1370d2e784eddc45a0204e281e8b05dfceda6ece |
|---|---|
| SHA3-384 hash: | cc75d21689cd37e94c99a968182cfefdeb70dd1b445f3f9a3ab2d035d264069d2fc3f0b553809e75321c44cd7f1c5668 |
| SHA1 hash: | 595f07a407d16db50e9776bb2b81ec76173fd5d1 |
| MD5 hash: | a4a78ba52f2a4551e27f056163dbd980 |
| humanhash: | triple-happy-black-xray |
| File name: | ALGOMA STEEL PROJECT.exe |
| Download: | download sample |
| Signature | GuLoader |
| File size: | 114'688 bytes |
| First seen: | 2020-06-03 17:25:50 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 9aba7a582d2dbc4986db87097a184cbb (1 x GuLoader) |
| ssdeep | 1536:3SPfxV40tOQcEiyM/dI1kgrKHxLdGKc+o0FDHdZ1gIxJVuMVxRTbw6w/:iPXpcS20KVdhjFD9z/9Rw |
| Threatray | 910 similar samples on MalwareBazaar |
| TLSH | 0FB37C07EE4D8553D2988FFE2D139E797B1CAA4A0D001BEF21756D9AAC315432C9F21E |
| Reporter | |
| Tags: | exe GuLoader |
abuse_ch
Malspam distributing GuLoader:HELO: server.huttprimax.partners
Sending IP: 162.241.215.47
From: pfinley@algoma.com
Reply-To: altan.tenagatiub@email.com
Subject: Algoma Steel //Urgent Inquiry //
Attachment: ALGOMA STEEL PROJECT.zip (contains "ALGOMA STEEL PROJECT.exe")
GuLoader payload URL:
http://jumapatagonia.com.ar/whitemaster/bin_JjNNLtz194.bin
Intelligence
File Origin
# of uploads :
1
# of downloads :
70
Origin country :
n/a
Vendor Threat Intelligence
Detection:
n/a
Gathering data
Threat name:
Win32.Trojan.Fareit
Status:
Malicious
First seen:
2020-06-03 17:35:58 UTC
AV detection:
22 of 31 (70.97%)
Threat level:
5/5
Detection(s):
Malicious file
Verdict:
malicious
Label(s):
guloader
Similar samples:
+ 900 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
5/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of NtSetInformationThreadHideFromDebugger
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.