MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8c48765f9e88fbdc738d2f0801fe6befcaa96484f8b6362d7f0b3fcfd13a4438. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments 1

SHA256 hash: 8c48765f9e88fbdc738d2f0801fe6befcaa96484f8b6362d7f0b3fcfd13a4438
SHA3-384 hash: 44a6bc930c99734bddaa4599a8013e81fa426f897623fbe4bf51248fe9c44b468c78bb09e3adf47529db1a051390ff4e
SHA1 hash: f48ac4009cd31cb69280699f287b2904fed5c335
MD5 hash: c40c80bfc4233d74225238ca09128227
humanhash: tennis-ohio-summer-beer
File name:LISTA DE ORDEN_PDF (2).exe
Download: download sample
Signature GuLoader
File size:237'568 bytes
First seen:2021-05-21 15:51:24 UTC
Last seen:2021-05-21 15:53:02 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 6362bc17930cc127ae2b7ff37e9122d2 (9 x GuLoader)
ssdeep 1536:7TEvVbJks3cfYF70TUvSqWxXBsTDsISE23bXkjjDFMgv8cqfcVkUjgxHTwih30JW:W+IYYhWMyx2EDGjDFMTcABzzJNX
Threatray 5'488 similar samples on MalwareBazaar
TLSH E634A486BA62E479E9C591B4F426C21F18E63C7332854E07BF832FA7B0301475DE9967
Reporter abuse_ch
Tags:exe GuLoader

Intelligence


File Origin
# of uploads :
3
# of downloads :
176
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
LISTA DE ORDEN_PDF (2).exe
Verdict:
No threats detected
Analysis date:
2021-05-21 21:01:36 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
GuLoader
Detection:
malicious
Classification:
troj
Score:
60 / 100
Signature
Initial sample is a PE file and has a suspicious name
Multi AV Scanner detection for submitted file
Yara detected GuLoader
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Vibem
Status:
Malicious
First seen:
2021-05-21 14:20:25 UTC
AV detection:
15 of 47 (31.91%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

GuLoader

Executable exe 8c48765f9e88fbdc738d2f0801fe6befcaa96484f8b6362d7f0b3fcfd13a4438

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments



Avatar
a̵c̵c̸i̵d̷e̵n̷t̴a̷l̴r̵e̷b̸e̴l̸ commented on 2021-05-21 16:24:34 UTC

============================================================
MBC behaviors list (github.com/accidentalrebel/mbcscan):
============================================================
0) [B0001.025] Anti-Behavioral Analysis::Software Breakpoints
1) [B0009.029] Anti-Behavioral Analysis::Instruction Testing
2) [C0002.014] Communication Micro-objective::Read Header::HTTP Communication
3) [C0019] Data Micro-objective::Check String