MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9233da098f6c171c69589dca2cb848c60c68de2f6720e4ac82ecd5feaedcfeed. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Guildma


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 9233da098f6c171c69589dca2cb848c60c68de2f6720e4ac82ecd5feaedcfeed
SHA3-384 hash: 942db20ca1a0a8e674233361376089799613c4041de7bc8543d37ee5526059852fbdbe29a096b40eeec37c0a5d4d6ea9
SHA1 hash: bf186bbfff2cdbc24c6b525296223020d6556d45
MD5 hash: a887a0fe5a6cf41956e090d51714b6a2
humanhash: nevada-london-nevada-ceiling
File name:a887a0fe5a6cf41956e090d51714b6a2.msi
Download: download sample
Signature Guildma
File size:278'528 bytes
First seen:2021-12-16 19:47:24 UTC
Last seen:Never
File type:Microsoft Software Installer (MSI) msi
MIME type:application/x-msi
ssdeep 6144:1uYtOIiRQYpgjpjew5LLyGx1qo86HnuJ:1uYtMRQ+gjpjegLyo8V
Threatray 19 similar samples on MalwareBazaar
TLSH T1EC447B513BC9C13AD2AE163785BA976A263A7D751B30D0CF77903D6C5E306D2EA39302
Reporter abuse_ch
Tags:BRA geo guildma msi

Intelligence


File Origin
# of uploads :
1
# of downloads :
312
Origin country :
n/a
Vendor Threat Intelligence
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
fingerprint packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Obfuscated command line found
Sigma detected: Suspicious MSHTA Process Patterns
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 541242 Sample: MqUJSu1DEf.msi Startdate: 16/12/2021 Architecture: WINDOWS Score: 48 56 Sigma detected: Suspicious MSHTA Process Patterns 2->56 9 msiexec.exe 3 16 2->9         started        12 msiexec.exe 5 2->12         started        process3 file4 48 C:\Windows\Installer\MSIF7DE.tmp, PE32 9->48 dropped 50 C:\Windows\Installer\MSIAD46.tmp, PE32 9->50 dropped 14 msiexec.exe 5 9->14         started        process5 signatures6 58 Obfuscated command line found 14->58 17 cmd.exe 1 14->17         started        20 expand.exe 8 14->20         started        23 icacls.exe 1 14->23         started        25 2 other processes 14->25 process7 file8 54 Obfuscated command line found 17->54 27 cmd.exe 1 17->27         started        29 conhost.exe 17->29         started        31 cmd.exe 2 17->31         started        44 C:\Users\user\AppData\...\diskperf.exe (copy), PE32+ 20->44 dropped 46 C:\...\1734fba971a77443b8e9d06de6f1fbc4.tmp, PE32+ 20->46 dropped 33 conhost.exe 20->33         started        35 conhost.exe 23->35         started        37 conhost.exe 25->37         started        39 conhost.exe 25->39         started        signatures9 process10 process11 41 mshta.exe 19 27->41         started        dnsIp12 52 1goub8.ogdebaucsjjeghfheesajgeumbjhsbdu.top 104.21.19.55, 49746, 80 CLOUDFLARENETUS United States 41->52
Threat name:
Win32.Trojan.Guildma
Status:
Malicious
First seen:
2021-12-16 19:48:12 UTC
File Type:
Binary (Archive)
Extracted files:
28
AV detection:
10 of 28 (35.71%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
discovery
Behaviour
Checks SCSI registry key(s)
Modifies Internet Explorer settings
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Drops file in Windows directory
Enumerates connected drives
Loads dropped DLL
Modifies file permissions
Blocklisted process makes network request
Executes dropped EXE
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments