MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 8d4b6b5a3f228456841a6627f6b4fe4de260e1261e312b30b62120d5297e68c1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
GuLoader
Vendor detections: 4
| SHA256 hash: | 8d4b6b5a3f228456841a6627f6b4fe4de260e1261e312b30b62120d5297e68c1 |
|---|---|
| SHA3-384 hash: | 1d3fcbb92f42dbdc000cb20f39e7a27c975b516eb7779cbbcb5ab392d666fddd60f33382f9bcf34acd51d1e83b345456 |
| SHA1 hash: | 50c91f9d0ae13ce7d201d909c59eaf278081ae97 |
| MD5 hash: | 21985f4388a169e646cc5a639d971bd7 |
| humanhash: | east-cup-kilo-nineteen |
| File name: | Payment W0301 - TC -[ref00D208TF]_pdf.exe |
| Download: | download sample |
| Signature | GuLoader |
| File size: | 81'920 bytes |
| First seen: | 2020-06-08 12:12:31 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 907c347b3bf3e931014a9faed830c76f (2 x GuLoader) |
| ssdeep | 768:Vu1aL3mNtlrHBOjv8I68BFlGjZTHi6JzrH41ZuoL6/eBuiCI7UOfTrU4r:VuRtSYRZriaPwsDeBuivoO/U |
| Threatray | 930 similar samples on MalwareBazaar |
| TLSH | 0683AE073698D512E14A0770ACB3DEB63A66BD2899816F4F2044BE5FE431B527CA732D |
| Reporter | |
| Tags: | exe GuLoader |
abuse_ch
Malspam distributing GuLoader:HELO: genopem.tk
Sending IP: 135.181.24.152
From: international payment <iban@crdbank.com> <admin@genopem.tk>
Subject: Fwd: SWIFT Payment W0301 - TC -[ref:00D208TF]
Attachment: Payment W0301 - TC -ref00D208TF_pdf.gz (contains "Payment W0301 - TC -[ref00D208TF]_pdf.exe")
GuLoader payload URL:
https://onedrive.live.com/download?cid=F5533CD060D35070&resid=F5533CD060D35070%21174&authkey=AIBDrJtaga1JUxw
Intelligence
File Origin
# of uploads :
1
# of downloads :
82
Origin country :
n/a
Vendor Threat Intelligence
Detection:
n/a
Detection(s):
Gathering data
Threat name:
Win32.Trojan.Vebzenpak
Status:
Malicious
First seen:
2020-06-08 12:14:06 UTC
AV detection:
22 of 28 (78.57%)
Threat level:
5/5
Detection(s):
Malicious file
Verdict:
malicious
Label(s):
guloader
Similar samples:
+ 920 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
5/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of NtSetInformationThreadHideFromDebugger
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.