MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9d74a45140396715c309ac076839d0abf83ad6e55a4c8fa6cdf6e9cb4dec8cf6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: 9d74a45140396715c309ac076839d0abf83ad6e55a4c8fa6cdf6e9cb4dec8cf6
SHA3-384 hash: 41a349b38c8c68b56aadffae31700bd78b5daebeebafc4f628eb65a69d14e319021bf968ab10fc2eb74f38e24e3dbbae
SHA1 hash: 3fb74c6d2c829e32a8b49708ab59ff7fd19e7294
MD5 hash: 56d525e4b293b53a37915917b4fe23f7
humanhash: blossom-football-solar-seven
File name:DOOYOUN CORPORATION Emergency Production Request.exe
Download: download sample
Signature GuLoader
File size:94'208 bytes
First seen:2020-05-27 15:58:01 UTC
Last seen:2020-05-27 16:51:02 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 4d9c043ee9c6f64ada916b54dbd959fe (1 x GuLoader)
ssdeep 768:caKFPS8YpWttb9X+5UR2AJAweAjFiYBAkGLdbmShtOXepQIt044xOCVZ0H9:hqPWpq9uKJfWddSOpQIt0uyE
Threatray 5'116 similar samples on MalwareBazaar
TLSH 77932A13B8790DA1E80241B0CCA2D3EF16D77D215D565F0FB6C83A6D68BA6862CF531E
Reporter abuse_ch
Tags:exe GuLoader


Avatar
abuse_ch
Malspam distributing GuLoader:

HELO: mail.richermoren.gq
Sending IP: 64.52.172.142
From: Jaeho Lee <reshina.jithesh@suez-oilandgas.com>
Reply-To: casmirfatih@gmail.com
Subject: DOOYOUN CORPORATION Emergency Production Request
Attachment: DOOYOUN CORPORATION Emergency Production Request.img (contains "DOOYOUN CORPORATION Emergency Production Request.exe")

GuLoader payload URL:
http://izpanelone.webredirect.org/uploud/5bab0b1d864615bab0b1d864b3/bin_LtTlZ208.bin

Intelligence


File Origin
# of uploads :
2
# of downloads :
79
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Vebzenpak
Status:
Malicious
First seen:
2020-05-27 13:31:54 UTC
File Type:
PE (Exe)
Extracted files:
6
AV detection:
26 of 31 (83.87%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of NtSetInformationThreadHideFromDebugger
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

GuLoader

Executable exe 9d74a45140396715c309ac076839d0abf83ad6e55a4c8fa6cdf6e9cb4dec8cf6

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments