MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a189b653beaa02ee38f4496b0916d881ba0c073f87208a5eea20f70ca036be58. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: a189b653beaa02ee38f4496b0916d881ba0c073f87208a5eea20f70ca036be58
SHA3-384 hash: 0a1de4191f50640f3cd206d6b54896d53b1b48195380b1ec104257f13c845bd207e8a6c007397d76fed7aa2efb0a9195
SHA1 hash: 056f5e36934f1cd5a09d99ca5f8dc02bbbe92306
MD5 hash: 7b82d4a02671a97a2cf29cf319d7d8fe
humanhash: double-oscar-yellow-failed
File name:Conchostra.exe
Download: download sample
Signature GuLoader
File size:110'592 bytes
First seen:2020-06-05 13:37:54 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f483a78878ddd7c6204e341c4b785e63 (1 x GuLoader)
ssdeep 3072:lrdho5EOuZjlW2TjAYOBsryB2bfmhqPL7ooYU5WV9:lu+Tj6qPL72U5WV
Threatray 1'034 similar samples on MalwareBazaar
TLSH FAB3821BAA59BC6DD1C93DB0BC15A89713163C14BB44A6BE12D0FBBCB630AA27C15707
Reporter abuse_ch
Tags:exe GuLoader


Avatar
abuse_ch
Malspam distributing GuLoader:

HELO: smtp77.iad3a.emailsrvr.com
Sending IP: 173.203.187.77
From: Elizabeth Chen <ase.nababgonj@olympicbd.com>
Reply-To: obe.sales@hotmail.com
Subject: 레: New Qoute 0605
Attachment: quote 0605.rar (contains "Conchostra.exe")

GuLoader payload URL:
https://drive.google.com/uc?export=download&id=1dJG05mz_jW9iQx4taSq8P0qvX-9btkYx

Intelligence


File Origin
# of uploads :
1
# of downloads :
86
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Vebzenpak
Status:
Malicious
First seen:
2020-06-05 11:15:41 UTC
AV detection:
22 of 31 (70.97%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
Suspicious behavior: MapViewOfSection
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Legitimate hosting services abused for malware hosting/C2
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

bf0b31371f47b603e9a50a12140514f6

GuLoader

Executable exe a189b653beaa02ee38f4496b0916d881ba0c073f87208a5eea20f70ca036be58

(this sample)

  
Dropped by
MD5 bf0b31371f47b603e9a50a12140514f6
  
Delivery method
Distributed via e-mail attachment

Comments