MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 bbd7431d0d5272927e67c43cd961df4d855a4dcd080373355f980d61ff110337. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: bbd7431d0d5272927e67c43cd961df4d855a4dcd080373355f980d61ff110337
SHA3-384 hash: 9186cad78701dd146f7046e66b19f6a62e2f4ef50716e40c19efae16b402acba63987e826ba40abdf91ded93f8855208
SHA1 hash: a494b39f2280fa4e97c9260739c4002a318eae3b
MD5 hash: c1493a6b8c00676bfed8876128c25a40
humanhash: mississippi-snake-batman-kilo
File name:Transfer Request Invoice.exe
Download: download sample
Signature GuLoader
File size:293'888 bytes
First seen:2022-02-09 10:20:35 UTC
Last seen:2022-02-14 15:11:18 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 56a78d55f3f7af51443e58e0ce2fb5f6 (719 x GuLoader, 451 x Formbook, 295 x Loki)
ssdeep 6144:ObE/HUgwXAZLaXc8JY39oTefazVImrfzpf7JGeiA4nfiWW6hc:Ob8wXAEce+o6fazVIwfzXIA4qL
Threatray 1'532 similar samples on MalwareBazaar
TLSH T1C754E1A0F3409C66E95343B95472DA364AABFE2654B0494B13EC3C2BB933793546BF03
File icon (PE):PE icon
dhash icon 00fcfcfce4e4fcfc (3 x GuLoader)
Reporter adrian__luca
Tags:exe GuLoader signed

Code Signing Certificate

Organisation:INDEKSKONTRAKTEN
Issuer:INDEKSKONTRAKTEN
Algorithm:sha256WithRSAEncryption
Valid from:2022-02-09T08:50:42Z
Valid to:2023-02-09T08:50:42Z
Serial number: 00
Intelligence: 325 malware samples on MalwareBazaar are signed with this code signing certificate
Cert Central Blocklist:This certificate is on the Cert Central blocklist
Thumbprint Algorithm:SHA256
Thumbprint: 0afec44016494fa8341e01080b6acd1108ef08134fdda6046c74edb8b865b3e4
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
4
# of downloads :
274
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Creating a window
Creating a file in the %temp% directory
Creating a file
DNS request
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
control.exe overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AgentTesla GuLoader
Detection:
malicious
Classification:
troj.evad.adwa.spyw
Score:
100 / 100
Behaviour
Behavior Graph:
n/a
Threat name:
Win32.Trojan.GuLoader
Status:
Malicious
First seen:
2022-02-09 10:25:32 UTC
File Type:
PE (Exe)
Extracted files:
28
AV detection:
16 of 28 (57.14%)
Threat level:
  5/5
Result
Malware family:
guloader
Score:
  10/10
Tags:
family:guloader downloader
Behaviour
Suspicious use of AdjustPrivilegeToken
Enumerates physical storage devices
Drops file in Windows directory
Loads dropped DLL
Guloader,Cloudeye
Unpacked files
SH256 hash:
8dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8
MD5 hash:
cff85c549d536f651d4fb8387f1976f2
SHA1 hash:
d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e
SH256 hash:
bbd7431d0d5272927e67c43cd961df4d855a4dcd080373355f980d61ff110337
MD5 hash:
c1493a6b8c00676bfed8876128c25a40
SHA1 hash:
a494b39f2280fa4e97c9260739c4002a318eae3b
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

GuLoader

Executable exe bbd7431d0d5272927e67c43cd961df4d855a4dcd080373355f980d61ff110337

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments