MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 bc0a3976025579d4a076226c8b5b237e81eb42b558ce68855694c5963722acbd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
GuLoader
Vendor detections: 5
| SHA256 hash: | bc0a3976025579d4a076226c8b5b237e81eb42b558ce68855694c5963722acbd |
|---|---|
| SHA3-384 hash: | dac9258f6830afd3219891dff1301a43717aade303316c12852c1be4cf45eee859c49530be0dd656d1ceb77d32f4376b |
| SHA1 hash: | 161f79fa3f15bd1095c17f0ea1d37f83f16e0895 |
| MD5 hash: | 4191d64c282f80c59dba59c93b9fa66a |
| humanhash: | alaska-beryllium-undress-muppet |
| File name: | Order EDC-416129_pdf.exe |
| Download: | download sample |
| Signature | GuLoader |
| File size: | 196'608 bytes |
| First seen: | 2020-06-02 16:01:32 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 2e2c8e5647ecd189d944d918a318ce09 (1 x GuLoader) |
| ssdeep | 1536:sQSPfxV40jOA+efSokgrKHxLdGKc+o0FDHdZ1gIZ+VvMJ46XDQDWuAgf1:wPXqtefBKVdhjFD9zr+6o1 |
| Threatray | 1'432 similar samples on MalwareBazaar |
| TLSH | 3C14E61BFD4DC78ED2048AB9F8354EF42618AF1BD8001A9BB5E5FE5E787020C2D561DA |
| Reporter | |
| Tags: | exe GuLoader |
abuse_ch
Malspam distributing GuLoader:HELO: steppersexpress.shop
Sending IP: 155.138.219.68
From: Tracy Anthony <sales@steppersexpress.shop>
Reply-To: sales@steppersexpress.shop
Subject: Order Receipt VCDG-6472415
Attachment: Order EDC-416129_pdf.img (contains "Order EDC-416129_pdf.exe")
GuLoader payload URL:
https://drive.google.com/uc?export=download&id=1hytzZZVV18Yt9gMZZQn_OV6U3rtBFe1W
Intelligence
File Origin
# of uploads :
1
# of downloads :
71
Origin country :
n/a
Vendor Threat Intelligence
Detection:
NanoCore
Detection(s):
Gathering data
Threat name:
Win32.Trojan.Fareit
Status:
Malicious
First seen:
2020-06-02 16:36:05 UTC
AV detection:
21 of 31 (67.74%)
Threat level:
2/5
Detection(s):
Malicious file
Verdict:
malicious
Label(s):
guloader
Similar samples:
+ 1'422 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
5/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of NtSetInformationThreadHideFromDebugger
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.