MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7e4bb8db363bbb2fdb438b89700166146671fca493247486d678cbff47bec727. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments 1

SHA256 hash: 7e4bb8db363bbb2fdb438b89700166146671fca493247486d678cbff47bec727
SHA3-384 hash: 16f3cc1b343ffff68bb39063f1291c717e58ed1c78ea269af810e5b6a0aaa00eda90dad90840c720878f74872eb9acb4
SHA1 hash: fea253ed51b4eaf2ee47a62e24c399a79243fac4
MD5 hash: b6d25d551f221fbdfd017198f7988af5
humanhash: south-network-artist-march
File name:Nonsuc3.exe
Download: download sample
Signature GuLoader
File size:114'688 bytes
First seen:2021-04-30 02:11:45 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 76ef284e8de2d28fc688c1a2294c28b3 (1 x GuLoader)
ssdeep 1536:VteqDBq+88SWhx21ND05m/D86HZgcN7uf1kOlG:6qNqCE1mOQ65gGwvE
Threatray 5'040 similar samples on MalwareBazaar
TLSH 2DB329E2B9F3F993E245C97387097A7C50D779B11ADB6543C0C1261C1BB27E0EA3069A
Reporter Anonymous
Tags:GuLoader

Intelligence


File Origin
# of uploads :
1
# of downloads :
200
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Nonsuc3.exe
Verdict:
No threats detected
Analysis date:
2021-04-30 02:05:14 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
52 / 100
Signature
Detected RDTSC dummy instruction sequence (likely for instruction hammering)
Found potential dummy code loops (likely to delay analysis)
Tries to detect virtualization through RDTSC time measurements
Behaviour
Behavior Graph:
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Unpacked files
SH256 hash:
7e4bb8db363bbb2fdb438b89700166146671fca493247486d678cbff47bec727
MD5 hash:
b6d25d551f221fbdfd017198f7988af5
SHA1 hash:
fea253ed51b4eaf2ee47a62e24c399a79243fac4
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments



Avatar
Rony commented on 2021-05-11 16:32:29 UTC

https://www.capesandbox.com/analysis/155145