MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b7949bfaf6abe4941e0e398499e8e4b020cdc6208d9fe40bcff9a02ed9367eff. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: b7949bfaf6abe4941e0e398499e8e4b020cdc6208d9fe40bcff9a02ed9367eff
SHA3-384 hash: e0d4b9dec571b3f04ef15e6dc31cf71cbf130d292b45ef57d939db84bc8559e3f83581ff15839d8574ef8c5cd3053a99
SHA1 hash: 88161b1bf62c6be2fc27469716345523124688c4
MD5 hash: ea59a20e38100ea7ca4575e79a0d87bd
humanhash: kansas-mexico-winner-summer
File name:F210855.exe
Download: download sample
Signature GuLoader
File size:143'360 bytes
First seen:2021-10-07 14:58:43 UTC
Last seen:2021-10-07 16:26:19 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash d0ac0bdf3a5152bcac064d77eed21690 (9 x GuLoader, 1 x Gozi)
ssdeep 3072:tLUHZINPyzF/W9gUqOhevmHRF41T1TsDzh/jrVB:tLU5zzFdUqOTfLrVB
Threatray 6'294 similar samples on MalwareBazaar
TLSH T18EE307D6B9CD8536D402E03F2B3FC557AB0D7C330A406983724E6B8AD7B11EA69B5346
File icon (PE):PE icon
dhash icon 00e0d282d2d200c2 (9 x GuLoader, 1 x Gozi)
Reporter lowmal3
Tags:exe GuLoader

Intelligence


File Origin
# of uploads :
3
# of downloads :
201
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
F210855.exe
Verdict:
No threats detected
Analysis date:
2021-10-07 15:02:32 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
GuLoader
Detection:
malicious
Classification:
troj.evad
Score:
68 / 100
Signature
C2 URLs / IPs found in malware configuration
Found malware configuration
Found potential dummy code loops (likely to delay analysis)
Tries to detect virtualization through RDTSC time measurements
Yara detected GuLoader
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.InjectorAGen
Status:
Malicious
First seen:
2021-10-07 14:59:05 UTC
AV detection:
14 of 28 (50.00%)
Threat level:
  5/5
Result
Malware family:
guloader
Score:
  10/10
Tags:
family:guloader downloader
Behaviour
Suspicious use of SetWindowsHookEx
Guloader,Cloudeye
Unpacked files
SH256 hash:
b7949bfaf6abe4941e0e398499e8e4b020cdc6208d9fe40bcff9a02ed9367eff
MD5 hash:
ea59a20e38100ea7ca4575e79a0d87bd
SHA1 hash:
88161b1bf62c6be2fc27469716345523124688c4
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

GuLoader

Executable exe b7949bfaf6abe4941e0e398499e8e4b020cdc6208d9fe40bcff9a02ed9367eff

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments