MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8250b55601a05bc91cc88f36e0e99642682e4a0d2a8752afc0651c8eaa7a0706. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 8250b55601a05bc91cc88f36e0e99642682e4a0d2a8752afc0651c8eaa7a0706
SHA3-384 hash: 80aef6411a80d669f9dfcce8b8349930cfc93b7901256ed8716d2400dd9e369488338c7968a3f5b3175ae4b0a80f8351
SHA1 hash: 93c4a41efb290dfb5b69655d478baf3159deed45
MD5 hash: 6ab492e4daf8b3c7ea22b08c806c5df5
humanhash: alanine-pizza-fruit-undress
File name:Quotation.bin
Download: download sample
Signature GuLoader
File size:77'824 bytes
First seen:2020-07-16 13:02:27 UTC
Last seen:2020-07-16 14:07:30 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash c3242e10845b04e6c5cab963243eb51d (1 x GuLoader)
ssdeep 768:+Zm9H9r3mqPD8hH4yscgiubB7fpcYAVk90JwfG2LJhqSI:UmaqPD8hrsc27BcYAVk9WwfG2LJhE
Threatray 930 similar samples on MalwareBazaar
TLSH 0E734B3366AD10B5E270CBFF3A3154B41967AC655B08DF131848AF5F1A32A463CF552B
Reporter JAMESWT_WT
Tags:GuLoader

Intelligence


File Origin
# of uploads :
2
# of downloads :
171
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Launching a process
Creating a process with a hidden window
Creating a file
DNS request
Setting a single autorun event
Unauthorized injection to a system process
Sending an HTTP GET request to an infection source
Result
Threat name:
GuLoader
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Contains functionality to hide a thread from the debugger
Hides threads from debuggers
Initial sample is a PE file and has a suspicious name
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Tries to detect virtualization through RDTSC time measurements
Yara detected GuLoader
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 246990 Sample: Quotation.bin Startdate: 19/07/2020 Architecture: WINDOWS Score: 100 43 Multi AV Scanner detection for domain / URL 2->43 45 Malicious sample detected (through community Yara rule) 2->45 47 Multi AV Scanner detection for submitted file 2->47 49 2 other signatures 2->49 7 Quotation.exe 1 2->7         started        10 filename1.exe 1 2->10         started        12 filename1.exe 1 2->12         started        process3 signatures4 51 Tries to detect virtualization through RDTSC time measurements 7->51 53 Hides threads from debuggers 7->53 14 RegAsm.exe 1 9 7->14         started        55 Multi AV Scanner detection for dropped file 10->55 19 RegAsm.exe 8 10->19         started        21 RegAsm.exe 10->21         started        23 RegAsm.exe 8 12->23         started        process5 dnsIp6 33 chuksurvive.to 104.31.69.84, 49721, 49724, 49725 CLOUDFLARENETUS United States 14->33 31 C:\Users\user\subfolder1\filename1.exe, PE32 14->31 dropped 35 Contains functionality to detect hardware virtualization (CPUID execution measurement) 14->35 37 Tries to detect virtualization through RDTSC time measurements 14->37 39 Hides threads from debuggers 14->39 41 Contains functionality to hide a thread from the debugger 14->41 25 conhost.exe 14->25         started        27 conhost.exe 19->27         started        29 conhost.exe 23->29         started        file7 signatures8 process9
Threat name:
Win32.Trojan.Vebzenpak
Status:
Malicious
First seen:
2020-07-15 10:31:32 UTC
File Type:
PE (Exe)
Extracted files:
2
AV detection:
22 of 29 (75.86%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of SetWindowsHookEx
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments