MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9435308eb1024c0e11753dc2412b9243af69d7388817e3aebc59a4a58f2ec372. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments 1

SHA256 hash: 9435308eb1024c0e11753dc2412b9243af69d7388817e3aebc59a4a58f2ec372
SHA3-384 hash: 354909c29c1562d11e5c5c95fc316aae959902bd7d192242ce8a9384a38b21d7dd438bfb2973b188f28c46240601af23
SHA1 hash: 75b47964426a5e8fcc7bb14ddf2bab380e59eb7c
MD5 hash: c2600528c452e288a545c35659f9ce6f
humanhash: video-cardinal-xray-white
File name:c2600528c452e288a545c35659f9ce6f
Download: download sample
Signature GuLoader
File size:110'592 bytes
First seen:2021-07-08 08:35:46 UTC
Last seen:2021-07-08 09:46:54 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f6e083d868a135a07d80f02d2a01fccd (4 x GuLoader)
ssdeep 1536:W4xltu7uRhWixtTTwc83azy+OKjy5ClRZsGBVhR:D6uHxtQclzXJeClfsGD
Threatray 1'637 similar samples on MalwareBazaar
TLSH T177B34A4BB3D09DE6FCE10A391C31C1A11923FC3178879F1776C63A5EBC786217AA9A11
Reporter zbetcheckin
Tags:32 exe GuLoader

Intelligence


File Origin
# of uploads :
2
# of downloads :
170
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
ISO certificate.js
Verdict:
Malicious activity
Analysis date:
2021-07-08 06:42:14 UTC
Tags:
trojan loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Creates autostart registry keys with suspicious values (likely registry only malware)
Detected RDTSC dummy instruction sequence (likely for instruction hammering)
Hides threads from debuggers
Installs a global keyboard hook
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Uses dynamic DNS services
Behaviour
Behavior Graph:
Result
Malware family:
guloader
Score:
  10/10
Tags:
family:guloader downloader
Behaviour
Suspicious use of SetWindowsHookEx
Guloader,Cloudeye
Malware Config
C2 Extraction:
https://onedrive.live.com/download?cid=D416D1B64F12090C&resid=D416D1B64F12090C%21116&authkey=ACchnlCZXoMgc20
Unpacked files
SH256 hash:
9435308eb1024c0e11753dc2412b9243af69d7388817e3aebc59a4a58f2ec372
MD5 hash:
c2600528c452e288a545c35659f9ce6f
SHA1 hash:
75b47964426a5e8fcc7bb14ddf2bab380e59eb7c
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

GuLoader

Executable exe 9435308eb1024c0e11753dc2412b9243af69d7388817e3aebc59a4a58f2ec372

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2021-07-08 08:35:48 UTC

url : hxxp://2.56.59.76/efryses.jpg