MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 a358d3d4418e1c83e8ee6abf052f91b8935363876612e319150bd725906f8906. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 3
| SHA256 hash: | a358d3d4418e1c83e8ee6abf052f91b8935363876612e319150bd725906f8906 |
|---|---|
| SHA3-384 hash: | 02cdaf6a1bf2d9a0c237ce4bea2091cab3eb576523a015a734067128b8c4952fd8135c4a3c42e9527383f9ee2ca53181 |
| SHA1 hash: | b06f0c37be2e7482aa2d132a53857c405eac40f5 |
| MD5 hash: | ae2acbf229c59818f061cbb96e841c11 |
| humanhash: | paris-spaghetti-oxygen-nineteen |
| File name: | ae2acbf229c59818f061cbb96e841c11.exe |
| Download: | download sample |
| File size: | 247'808 bytes |
| First seen: | 2020-04-05 07:40:55 UTC |
| Last seen: | 2020-04-08 12:46:59 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | d54856e90bade24074537e8303268776 (1 x RemcosRAT) |
| ssdeep | 6144:ZSb2lCqrKiaECke4CFB2v/hCX2+wNWx5zL5tzYJ:XQIza6mFBuMXRx5zrYJ |
| Threatray | 459 similar samples on MalwareBazaar |
| TLSH | 5D34E137A5C18477C2526AFC8D4A52D8B63EFE323E64549F66DE2D0E4FEE281146C0D2 |
| Reporter | |
| Tags: | exe GuLoader |
abuse_ch
Payload dropped by GuLoader from the following URL:daolnwod=tropxe&WHi1xe-XfUIoAfdsi0rcwXDlZt9IN8wO1=di?cu/0/u/moc.elgoog.evird//:sptth
Intelligence
File Origin
Vendor Threat Intelligence
File information
The table below shows additional information about this malware sample such as delivery method and external references.
eb3aba8419f491b11dd549a69e794f2a186967a46e93e4422170f6b572959aaa
dll a358d3d4418e1c83e8ee6abf052f91b8935363876612e319150bd725906f8906
(this sample)
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_NX | Missing Non-Executable Memory Protection | critical |
| CHECK_PIE | Missing Position-Independent Executable (PIE) Protection | high |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| SHELL_API | Manipulates System Shell | shell32.dll::ShellExecuteA |
| URL_MONIKERS_API | Can Download & Execute components | URLMON.DLL::URLDownloadToFileA |
| WIN32_PROCESS_API | Can Create Process and Threads | kernel32.dll::CreateRemoteThread kernel32.dll::CreateProcessA kernel32.dll::VirtualAllocEx kernel32.dll::WriteProcessMemory kernel32.dll::CloseHandle |
| WIN_BASE_API | Uses Win Base API | kernel32.dll::LoadLibraryExA kernel32.dll::LoadLibraryA kernel32.dll::GetStartupInfoA kernel32.dll::GetDiskFreeSpaceA kernel32.dll::GetCommandLineA |
| WIN_BASE_IO_API | Can Create Files | kernel32.dll::CreateDirectoryA kernel32.dll::CreateFileA kernel32.dll::DeleteFileA kernel32.dll::GetFileAttributesA kernel32.dll::FindFirstFileA |
| WIN_REG_API | Can Manipulate Windows Registry | advapi32.dll::RegCreateKeyExA advapi32.dll::RegOpenKeyExA advapi32.dll::RegQueryValueExA advapi32.dll::RegSetValueExA |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.