MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b07907ce3ee14b8128039ecb8e635976fc216c77035d5bf38f42ed900197c879. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 14


Intelligence 14 IOCs YARA 3 File information Comments

SHA256 hash: b07907ce3ee14b8128039ecb8e635976fc216c77035d5bf38f42ed900197c879
SHA3-384 hash: 7a8be4378360c9e113cd73eea6fcfc60883be5594525ccf2e9d7256e24b82bfa094ce6ffc3dde441c4f566b1ec85cbc0
SHA1 hash: c570e0cec229a601331ff9c0d9c302bba0d85af7
MD5 hash: b45e428f86c60736f83bbcf4662a0deb
humanhash: beryllium-romeo-december-nebraska
File name:Semiconformist.exe
Download: download sample
Signature GuLoader
File size:334'208 bytes
First seen:2023-11-29 15:28:38 UTC
Last seen:2023-11-29 17:26:45 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 3abe302b6d9a1256e6a915429af4ffd2 (271 x GuLoader, 38 x Formbook, 25 x Loki)
ssdeep 6144:ZjpfVIVK/SZ35l0SWLLzpSAGIyRM7wJ1wpxdMLkPiP7zo8Xq:H94KaZr0sTLJ1wJo7q
TLSH T18164126317E5A0A3FBC642B41B7BA933D7B0A7F8103258EB4B345F747A131265A09277
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla)
Reporter lowmal3
Tags:exe GuLoader signed

Code Signing Certificate

Organisation:Eightfold
Issuer:Eightfold
Algorithm:sha256WithRSAEncryption
Valid from:2023-11-10T00:20:23Z
Valid to:2026-11-09T00:20:23Z
Serial number: 6dd0483f742553babb85c1b9b6de9a80bf927d9e
Thumbprint Algorithm:SHA256
Thumbprint: c493cb744b4767b099a8dc35bfe5aa59f8a23f43e784655a22a5a33f40eacd5b
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
324
Origin country :
DE DE
Vendor Threat Intelligence
Malware family:
guloader
ID:
1
File name:
Semiconformist.exe
Verdict:
Malicious activity
Analysis date:
2023-11-29 15:31:49 UTC
Tags:
guloader loader trojan rat remcos remote

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Creating a window
Creating a file in the %temp% subdirectories
Searching for the window
Searching for the Windows task manager window
Launching a process
Creating a process with a hidden window
Using the Windows Management Instrumentation requests
Gathering data
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Remcos, GuLoader
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
Found suspicious powershell code related to unpacking or dynamic code loading
Installs a global keyboard hook
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Powershell drops PE file
Sample uses process hollowing technique
Sigma detected: Remcos
Snort IDS alert for network traffic
Submitted sample is a known malware sample
Suspicious powershell command line found
Writes to foreign memory regions
Yara detected GuLoader
Yara detected Remcos RAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1349970 Sample: Semiconformist.exe Startdate: 29/11/2023 Architecture: WINDOWS Score: 100 46 geoplugin.net 2->46 48 Snort IDS alert for network traffic 2->48 50 Antivirus detection for URL or domain 2->50 52 Multi AV Scanner detection for dropped file 2->52 54 4 other signatures 2->54 9 Semiconformist.exe 1 42 2->9         started        signatures3 process4 file5 34 C:\Users\user\AppData\Local\...\Kristjan.Ani, ASCII 9->34 dropped 36 C:\Users\user\AppData\Local\...\nsExec.dll, PE32 9->36 dropped 60 Submitted sample is a known malware sample 9->60 62 Suspicious powershell command line found 9->62 13 powershell.exe 20 9->13         started        signatures6 process7 file8 38 C:\Users\user\AppData\...\Semiconformist.exe, PE32 13->38 dropped 64 Writes to foreign memory regions 13->64 66 Maps a DLL or memory area into another process 13->66 68 Found suspicious powershell code related to unpacking or dynamic code loading 13->68 70 Powershell drops PE file 13->70 17 wab.exe 3 16 13->17         started        22 conhost.exe 13->22         started        signatures9 process10 dnsIp11 40 172.93.164.28, 49718, 80 PEGTECHINCUS United States 17->40 42 172.93.217.218, 2404, 49719, 49720 SNEAKER-SERVERUS United States 17->42 44 geoplugin.net 178.237.33.50, 49721, 80 ATOM86-ASATOM86NL Netherlands 17->44 32 C:\ProgramData\remcos\logs.dat, data 17->32 dropped 56 Sample uses process hollowing technique 17->56 58 Installs a global keyboard hook 17->58 24 conhost.exe 17->24         started        26 wab.exe 17->26         started        28 wab.exe 17->28         started        30 31 other processes 17->30 file12 signatures13 process14
Threat name:
Win32.Trojan.GuLoader
Status:
Malicious
First seen:
2023-11-29 07:33:02 UTC
File Type:
PE (Exe)
Extracted files:
10
AV detection:
19 of 37 (51.35%)
Threat level:
  5/5
Verdict:
unknown
Result
Malware family:
Score:
  10/10
Tags:
family:remcos botnet:remotehost collection rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Windows directory
Suspicious use of NtCreateThreadExHideFromDebugger
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses Microsoft Outlook accounts
Loads dropped DLL
NirSoft MailPassView
NirSoft WebBrowserPassView
Nirsoft
Remcos
Malware Config
C2 Extraction:
172.93.217.218:2404
Unpacked files
SH256 hash:
42da78cbeb8edc7ff9ffddf44d09714118bd8dc70a32b101879ad470d527173a
MD5 hash:
438effb4929530a9028e7755030096ba
SHA1 hash:
79bb23072b4b570027db7908afdcfb5097d355ea
SH256 hash:
b07907ce3ee14b8128039ecb8e635976fc216c77035d5bf38f42ed900197c879
MD5 hash:
b45e428f86c60736f83bbcf4662a0deb
SHA1 hash:
c570e0cec229a601331ff9c0d9c302bba0d85af7
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Ins_NSIS_Buer_Nov_2020_1
Author:Arkbird_SOLG
Description:Detect NSIS installer used for Buer loader
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

GuLoader

Executable exe b07907ce3ee14b8128039ecb8e635976fc216c77035d5bf38f42ed900197c879

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments