MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 89210ae907c9573298a900f88b97082c190618d64ecfa37eb5afda4615629475. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 89210ae907c9573298a900f88b97082c190618d64ecfa37eb5afda4615629475
SHA3-384 hash: f95f2f08f5c76e01254ac056312c5e87c9302830f0586bcd82c0bf67c85b90b933af347cdc920b5eb768a509990e4280
SHA1 hash: 921a5ebe1d32eaf5a8aeb710728144d5286685ef
MD5 hash: 6da0226265ebf7f22b33d07f88afbc69
humanhash: timing-washington-mississippi-bacon
File name:mich.exe_
Download: download sample
Signature GuLoader
File size:122'880 bytes
First seen:2020-03-18 13:33:57 UTC
Last seen:2020-03-18 16:01:05 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash ba764490bfb332d0b379f9ebd6b9dd3d (1 x GuLoader)
ssdeep 1536:3LWFISbicjH5F2Rcr5x19AiCv1JsZyw+rUtTB11kM49:6FHXj56nZwUrGTNkJ9
Threatray 509 similar samples on MalwareBazaar
TLSH 7FC39D42FB50D867D11A8A3FAC46D2D3091FBC6825E2D95B39947B2E78F40E1CF1D621
Reporter oppimaniac
Tags:exe GuLoader

Intelligence


File Origin
# of uploads :
2
# of downloads :
90
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Injector
Status:
Malicious
First seen:
2020-03-18 13:16:13 UTC
AV detection:
25 of 30 (83.33%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

GuLoader

Executable exe 89210ae907c9573298a900f88b97082c190618d64ecfa37eb5afda4615629475

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
VB_APILegacy Visual Basic API usedMSVBVM60.DLL::EVENT_SINK_AddRef

Comments