MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b54efef8396314c1f95d540ce7d0ca79f9c8c98e431c6dd177ecf037167957de. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: b54efef8396314c1f95d540ce7d0ca79f9c8c98e431c6dd177ecf037167957de
SHA3-384 hash: 4d52f0ce39b1e4bb76f7691704ad3a9db0260292d6bfeefa4f80a606f7a98096d5151d45f970ab7896172633441f3183
SHA1 hash: 5363b8b0e9bd91b5380f1d1f42f39f551d99aa2a
MD5 hash: 608d5496256acbf5cfc93f4958333160
humanhash: king-leopard-muppet-robert
File name:pago de factura pendiente.exe
Download: download sample
Signature GuLoader
File size:143'360 bytes
First seen:2021-10-07 11:58:26 UTC
Last seen:2021-10-07 13:13:05 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash d0ac0bdf3a5152bcac064d77eed21690 (9 x GuLoader, 1 x Gozi)
ssdeep 3072:tgs7G8QovC7K6oLGP18y1ug9DNBYenlTERzh/jrVB:th7jQovC7KbS98yJkLrVB
Threatray 958 similar samples on MalwareBazaar
TLSH T13EE305D1B5CD8536C402E0BF2B7F9467AB1C7C3304406A93B28E2B85D7B12EA69F5356
File icon (PE):PE icon
dhash icon 00e0d282d2d200c2 (9 x GuLoader, 1 x Gozi)
Reporter abuse_ch
Tags:ESP exe geo GuLoader

Intelligence


File Origin
# of uploads :
2
# of downloads :
199
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
pago de factura pendiente.exe
Verdict:
No threats detected
Analysis date:
2021-10-07 12:45:04 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
GuLoader
Detection:
malicious
Classification:
troj.evad
Score:
76 / 100
Signature
C2 URLs / IPs found in malware configuration
Found malware configuration
Found potential dummy code loops (likely to delay analysis)
Multi AV Scanner detection for submitted file
Tries to detect virtualization through RDTSC time measurements
Yara detected GuLoader
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.InjectorAGen
Status:
Malicious
First seen:
2021-10-07 11:59:03 UTC
AV detection:
15 of 28 (53.57%)
Threat level:
  5/5
Result
Malware family:
guloader
Score:
  10/10
Tags:
family:guloader downloader
Behaviour
Suspicious use of SetWindowsHookEx
Guloader,Cloudeye
Unpacked files
SH256 hash:
b54efef8396314c1f95d540ce7d0ca79f9c8c98e431c6dd177ecf037167957de
MD5 hash:
608d5496256acbf5cfc93f4958333160
SHA1 hash:
5363b8b0e9bd91b5380f1d1f42f39f551d99aa2a
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments