MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b39e4e2e3b7412b08824434b0cce7049fcca04761e4e88ba3ea510fabbd43d07. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: b39e4e2e3b7412b08824434b0cce7049fcca04761e4e88ba3ea510fabbd43d07
SHA3-384 hash: 762b3341bba175220234d3c89f4892c040271f1bb5b746c3dc2dcb76eed209373f9191c93116ec0a0fdf203b384c9213
SHA1 hash: 591c818b2b5e173d8a87438d60246a0583613557
MD5 hash: 0c65dbfcab3d666f8297152000fe6f6c
humanhash: nuts-hotel-chicken-ceiling
File name:New Order Set Documents.exe
Download: download sample
Signature GuLoader
File size:159'744 bytes
First seen:2020-04-08 10:53:57 UTC
Last seen:2020-04-08 11:59:40 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 2491a499ae1536e8116ee138d10e90d4 (1 x GuLoader)
ssdeep 1536:UFA+BcTGptd1AvWatywvUamxsiHHq0a9C2cTBU:CA+mS1VatywvUa3FMu
Threatray 759 similar samples on MalwareBazaar
TLSH 9BF3B5A57760FAE5F00608F4B979BE7864F83C312618640FFBC27365647AA49F834693
Reporter abuse_ch
Tags:COVID-19 exe GuLoader


Avatar
abuse_ch
COVID-19 themed malspam distributing GuLoader:

HELO: vm02-monty.h4ahosting.com
Sending IP: 41.72.154.151
From: Lia Pozvek <dokadalogistique@gmail.com>
Subject: Re: TR: COVID-19 order RFQ
Attachment: TR COVID-19 order RFQ.img (contains "New Order Set Documents.exe")

GuLoader payload URL:
https://drive.google.com/uc?export=download&id=1v9S2PulMt_BVCwTNUMpWG9zdn2ft7Nzp

Intelligence


File Origin
# of uploads :
2
# of downloads :
94
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Fareit
Status:
Malicious
First seen:
2020-04-08 08:28:50 UTC
File Type:
PE (Exe)
Extracted files:
6
AV detection:
27 of 31 (87.10%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

GuLoader

Executable exe b39e4e2e3b7412b08824434b0cce7049fcca04761e4e88ba3ea510fabbd43d07

(this sample)

  
Delivery method
Distributed via e-mail attachment

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
VB_APILegacy Visual Basic API usedMSVBVM60.DLL::__vbaObjSetAddref
MSVBVM60.DLL::EVENT_SINK_AddRef
MSVBVM60.DLL::__vbaLateMemCallLd

Comments