MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a18ab93f8c9268841b6cd59842a935651d9267fa2b8f72b2196cf68f7b57df9d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: a18ab93f8c9268841b6cd59842a935651d9267fa2b8f72b2196cf68f7b57df9d
SHA3-384 hash: 126ba2c4d2a950e285126e933ad63635d8a461b49efd19997ee2b552aa1c5bd18e244da80c5596b862dcf16c0e97f671
SHA1 hash: 7c486ed6065874812b703d8f1da4aa101716b5d7
MD5 hash: 18098f2c49c01f01ec5df99dd572211c
humanhash: hotel-maine-lamp-illinois
File name:SecuriteInfo.com.Trojan.Win32.Agent.oas1.9625.9272
Download: download sample
Signature GuLoader
File size:165'024 bytes
First seen:2022-08-22 03:33:08 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash e2a592076b17ef8bfb48b7e03965a3fc (388 x GuLoader, 59 x RemcosRAT, 44 x VIPKeylogger)
ssdeep 3072:5hoYsBN8xo+Oiou3jRdwP3xYLRTlVqqOcT3K2Klcy51Clb0PEQN:5LsBN8xoIvdysPVHT2c41Cp0P
Threatray 1'212 similar samples on MalwareBazaar
TLSH T159F35A1D7BD29B1BC0A3433159E763527A78EC61FF2B43035A52361A2CA23E15A5B1FC
TrID 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
16.4% (.EXE) Win64 Executable (generic) (10523/12/4)
10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.0% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 0862f292e2f0fc3c (3 x GuLoader)
Reporter SecuriteInfoCom
Tags:exe GuLoader signed

Code Signing Certificate

Organisation:Jubes Pois Guineaneren
Issuer:Jubes Pois Guineaneren
Algorithm:sha256WithRSAEncryption
Valid from:2021-12-24T17:44:17Z
Valid to:2024-12-23T17:44:17Z
Serial number: 6134421c398c1b34
Thumbprint Algorithm:SHA256
Thumbprint: 76373ce6e320bfffb3a5bc584a72bc3cf0a11831d67b4fe581ec66702468e4e6
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
325
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
guloader
ID:
1
File name:
SecuriteInfo.com.Trojan.Win32.Agent.oas1.9625.9272
Verdict:
Malicious activity
Analysis date:
2022-08-22 03:33:57 UTC
Tags:
guloader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Creating a file in the %temp% subdirectories
Sending a custom TCP request
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AgentTesla, GuLoader
Detection:
malicious
Classification:
troj.evad.spyw
Score:
100 / 100
Signature
Found stalling execution ending in API Sleep call
Hides threads from debuggers
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Snort IDS alert for network traffic
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
Yara detected AgentTesla
Yara detected GuLoader
Yara detected Telegram RAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 687775 Sample: SecuriteInfo.com.Trojan.Win... Startdate: 22/08/2022 Architecture: WINDOWS Score: 100 22 api.telegram.org 2->22 28 Snort IDS alert for network traffic 2->28 30 Yara detected GuLoader 2->30 32 Yara detected Telegram RAT 2->32 34 3 other signatures 2->34 8 SecuriteInfo.com.Trojan.Win32.Agent.oas1.9625.exe 5 13 2->8         started        signatures3 process4 file5 20 C:\Users\user\AppData\Local\...\System.dll, PE32 8->20 dropped 36 Found stalling execution ending in API Sleep call 8->36 38 Writes to foreign memory regions 8->38 40 Tries to detect Any.run 8->40 42 Hides threads from debuggers 8->42 12 CasPol.exe 15 11 8->12         started        16 CasPol.exe 8->16         started        signatures6 process7 dnsIp8 24 api.telegram.org 149.154.167.220, 443, 49808 TELEGRAMRU United Kingdom 12->24 26 23.254.119.4, 49790, 80 SERVER-MANIACA Canada 12->26 44 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 12->44 46 Tries to steal Mail credentials (via file / registry access) 12->46 48 Tries to harvest and steal ftp login credentials 12->48 54 3 other signatures 12->54 18 conhost.exe 12->18         started        50 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 16->50 52 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 16->52 signatures9 process10
Threat name:
Win32.Trojan.Guloader
Status:
Malicious
First seen:
2022-08-22 03:34:09 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
11 of 26 (42.31%)
Threat level:
  5/5
Result
Malware family:
guloader
Score:
  10/10
Tags:
family:guloader discovery downloader
Behaviour
Enumerates physical storage devices
Drops file in Windows directory
Checks installed software on the system
Loads dropped DLL
Guloader,Cloudeye
Unpacked files
SH256 hash:
bd046e6497b304e4ea4ab102cab2b1f94ce09bde0eebba4c59942a732679e4eb
MD5 hash:
17ed1c86bd67e78ade4712be48a7d2bd
SHA1 hash:
1cc9fe86d6d6030b4dae45ecddce5907991c01a0
SH256 hash:
a18ab93f8c9268841b6cd59842a935651d9267fa2b8f72b2196cf68f7b57df9d
MD5 hash:
18098f2c49c01f01ec5df99dd572211c
SHA1 hash:
7c486ed6065874812b703d8f1da4aa101716b5d7
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments