MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b4faad2ab96b7348202784c23e871c07a7e5cc2ff7f0d83037cb26954f1bb8e3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: b4faad2ab96b7348202784c23e871c07a7e5cc2ff7f0d83037cb26954f1bb8e3
SHA3-384 hash: 5d76f8eeddd01ba8627c60050e9b81fb61cd66d2d631bb500da52f69c1d21de95d067fc543c61646890a0f22e9c47bbf
SHA1 hash: 379002092e36ff016663434a31d2749bc8c3dc50
MD5 hash: f00ce1a5987f41af59f56f5b9f011ce4
humanhash: cardinal-twenty-foxtrot-equal
File name:Invoice.exe
Download: download sample
Signature GuLoader
File size:73'728 bytes
First seen:2020-03-17 09:42:01 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c2cfc7a99cf71098b892c943acce691e (1 x GuLoader)
ssdeep 1536:lZqtBzdRXvhz7KI0ryirQs+p+4+puAez7KI0ryiTLyRbW:Ot1//97KI0ryiMB0lw/7KI0ryiTaa
Threatray 1'175 similar samples on MalwareBazaar
TLSH D6738DD5A6CEC57DC4679BB400CA539B2FFB4534C7E1045B28B3460429AEF0A1EE6376
Reporter cocaman
Tags:exe GuLoader

Intelligence


File Origin
# of uploads :
1
# of downloads :
95
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Infostealer.PonyStealer
Status:
Malicious
First seen:
2020-03-17 18:01:44 UTC
File Type:
PE (Exe)
Extracted files:
16
AV detection:
24 of 29 (82.76%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

GuLoader

Executable exe b4faad2ab96b7348202784c23e871c07a7e5cc2ff7f0d83037cb26954f1bb8e3

(this sample)

  
Delivery method
Other

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
VB_APILegacy Visual Basic API usedMSVBVM60.DLL::EVENT_SINK_AddRef

Comments