MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 8357fd2e6327d05c86d6e2729b65eafaf756322bc1e7bb7878cf75595c40abe2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
GuLoader
Vendor detections: 4
| SHA256 hash: | 8357fd2e6327d05c86d6e2729b65eafaf756322bc1e7bb7878cf75595c40abe2 |
|---|---|
| SHA3-384 hash: | c438bc2a1e4645c7dd228ca7021e0cf7f61ac8980d9ec3efad87fc7b9c39fbbc22cc99ba012cb6e1fb7589473e82afe8 |
| SHA1 hash: | 4c6a14ee39e23deebba07ddc754e2627df1007c7 |
| MD5 hash: | 2d1a02097fabb443a8cd09ed3f2ee6e0 |
| humanhash: | south-cup-high-solar |
| File name: | PEMBAYARAN COPY TT_PDF.exe |
| Download: | download sample |
| Signature | GuLoader |
| File size: | 110'592 bytes |
| First seen: | 2020-06-03 13:08:49 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 474693c99a01118153c14f0a9689c648 (1 x GuLoader) |
| ssdeep | 1536:RSPfxV40qq3R25TfkgrKHxLdGKc+o0FDHdZ1gIqHAJlT9imQ4sd2:kPXqq3R2dKVdhjFD9zXrUd2 |
| Threatray | 976 similar samples on MalwareBazaar |
| TLSH | 87B37B1BEC4D8553D1448B7D3D138EB93A1DA91D0D016BEF72796E9BBE312422CAB10E |
| Reporter | |
| Tags: | exe GuLoader |
abuse_ch
Malspam distributing GuLoader:HELO: cpanel.namahosting.id
Sending IP: 202.138.226.66
From: (BCA) Jakarta Corporate Banking Department <yoyok@kwarsahexagon.co.id>
Subject: Slip Pembayaran - Pembayaran dikirimkan 29/05/2020 (Pengingat Terakhir !!!)
Attachment: PEMBAYARAN COPY TT_PDF.gz (contains "PEMBAYARAN COPY TT_PDF.exe")
GuLoader payload URL:
https://cmdtech.com.vn/MY_XXX_VUVHawg214.bin
Intelligence
File Origin
# of uploads :
1
# of downloads :
67
Origin country :
n/a
Vendor Threat Intelligence
Detection:
n/a
Detection(s):
Gathering data
Threat name:
Win32.Trojan.Razy
Status:
Malicious
First seen:
2020-06-03 01:19:53 UTC
AV detection:
24 of 48 (50.00%)
Threat level:
2/5
Detection(s):
Malicious file
Verdict:
malicious
Label(s):
guloader
Similar samples:
+ 966 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
5/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of NtSetInformationThreadHideFromDebugger
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.