MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 beecd658bfb84b9c4be5988df3743d231c405bc7ef8dce0a0eb5bbce668c7760. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 15


Intelligence 15 IOCs YARA 2 File information Comments

SHA256 hash: beecd658bfb84b9c4be5988df3743d231c405bc7ef8dce0a0eb5bbce668c7760
SHA3-384 hash: 9663c280dd7da2936171832027a9e2d39eb18274ccfe7380914d4051bc558aab7fb336a11781003909b46f141f0b5a5b
SHA1 hash: f0250ebcc2028a33213273a8c4c8c0550efb491c
MD5 hash: 5f2c20ba62ad50901610b5c9840ffcaa
humanhash: aspen-carpet-iowa-diet
File name:HSBC_PAYMENT_ADVICE_100212025_REFP3200B-20250813-024142914208136738390.exe
Download: download sample
Signature GuLoader
File size:432'928 bytes
First seen:2025-10-22 13:04:26 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash e2a592076b17ef8bfb48b7e03965a3fc (398 x GuLoader, 59 x RemcosRAT, 45 x AgentTesla)
ssdeep 6144:Shgqhw9oAsqdBsAWZzhhkgK5MseZmSYF3ONdPrXevfHrR/VWyUdVPSHf8Gik9mJk:xqfqfIbhz7JBrqfHrRtWTYEVinc/i
TLSH T1D8942307676AF427E1F65B702875EA3758A9C63E45A8A703631879C87D33B81DF0F242
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10522/11/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
Reporter abuse_ch
Tags:exe GuLoader HSBC signed

Code Signing Certificate

Organisation:Ankesagens
Issuer:Ankesagens
Algorithm:sha256WithRSAEncryption
Valid from:2025-09-14T09:10:35Z
Valid to:2026-09-14T09:10:35Z
Serial number: 5793ef8e18cd9ad89f70472cbb44970ce24af97b
Thumbprint Algorithm:SHA256
Thumbprint: 621c3391a5910d20f830e95b36b97a15352e3702824e89c4803e48fc8ec603c0
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
170
Origin country :
SE SE
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
HSBC_PAYMENT_ADVICE_100212025_REFP3200B-20250813-024142914208136738390.exe
Verdict:
Malicious activity
Analysis date:
2025-10-22 13:12:50 UTC
Tags:
rat remcos remote auto-reg stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.1%
Tags:
obfuscated obfuscate xtreme
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Searching for the window
Creating a file in the %AppData% subdirectories
Launching a process
Using the Windows Management Instrumentation requests
Creating a file in the %temp% directory
Verdict:
Malicious
File Type:
exe x32
First seen:
2025-10-22T01:15:00Z UTC
Last seen:
2025-10-24T11:20:00Z UTC
Hits:
~1000
Detections:
Trojan-Downloader.Win32.Minix.sb Trojan.NSIS.Makoob.sba HEUR:Backdoor.Win32.Remcos.gen
Result
Threat name:
Detection:
malicious
Classification:
phis.troj.spyw.evad
Score:
100 / 100
Signature
AI detected suspicious PE digital signature
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Detected Remcos RAT
Found hidden mapped module (file has been removed from disk)
Found malware configuration
Found suspicious powershell code related to unpacking or dynamic code loading
Initial sample is a PE file and has a suspicious name
Installs a global keyboard hook
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
Powershell drops PE file
Sample has a suspicious name (potential lure to open the executable)
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Yara detected Remcos RAT
Yara detected WebBrowserPassView password recovery tool
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1799845 Sample: HSBC_PAYMENT_ADVICE_1002120... Startdate: 22/10/2025 Architecture: WINDOWS Score: 100 37 web.opendrive.com 2->37 39 od.lk 2->39 57 Suricata IDS alerts for network traffic 2->57 59 Found malware configuration 2->59 61 Antivirus detection for dropped file 2->61 63 11 other signatures 2->63 9 HSBC_PAYMENT_ADVICE_100212025_REFP3200B-20250813-024142914208136738390.exe 1 36 2->9         started        signatures3 process4 process5 11 powershell.exe 6 48 9->11         started        dnsIp6 41 209.54.103.149, 26713, 49694, 49695 ASN-QUADRANET-GLOBALUS United States 11->41 43 web.opendrive.com 38.108.185.65, 443, 49693 COGENT-174US United States 11->43 45 od.lk 38.108.185.79, 443, 49692 COGENT-174US United States 11->45 29 C:\Users\user\AppData\Local\Temp\TH1CE.tmp, MS-DOS 11->29 dropped 31 C:\Users\user\AppData\Local\Temp\TH1AE.tmp, MS-DOS 11->31 dropped 33 C:\Users\user\AppData\Local\Temp\TH19D.tmp, PE32 11->33 dropped 35 2 other malicious files 11->35 dropped 65 Detected Remcos RAT 11->65 67 Obfuscated command line found 11->67 69 Found hidden mapped module (file has been removed from disk) 11->69 71 6 other signatures 11->71 16 RmClient.exe 14 11->16         started        19 RmClient.exe 1 11->19         started        21 RmClient.exe 1 11->21         started        23 3 other processes 11->23 file7 signatures8 process9 signatures10 47 Tries to steal Mail credentials (via file registry) 16->47 49 Tries to harvest and steal browser information (history, passwords, etc) 16->49 51 Tries to steal Instant Messenger accounts or passwords 19->51 53 Tries to steal Mail credentials (via file / registry access) 19->53 55 Obfuscated command line found 23->55 25 conhost.exe 23->25         started        27 reg.exe 1 1 23->27         started        process11
Verdict:
inconclusive
YARA:
5 match(es)
Tags:
Executable NSIS Installer PE (Portable Executable) PE File Layout Win 32 Exe x86
Threat name:
Win32.Trojan.Egairtigado
Status:
Malicious
First seen:
2025-10-22 04:10:07 UTC
File Type:
PE (Exe)
Extracted files:
10
AV detection:
24 of 38 (63.16%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:remcos botnet:bud1 collection discovery execution persistence rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Command and Scripting Interpreter: PowerShell
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Windows directory
Suspicious use of NtCreateThreadExHideFromDebugger
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses Microsoft Outlook accounts
Adds Run key to start application
Badlisted process makes network request
Detected Nirsoft tools
NirSoft MailPassView
NirSoft WebBrowserPassView
Remcos
Remcos family
Malware Config
C2 Extraction:
209.54.103.149:26713
Unpacked files
SH256 hash:
beecd658bfb84b9c4be5988df3743d231c405bc7ef8dce0a0eb5bbce668c7760
MD5 hash:
5f2c20ba62ad50901610b5c9840ffcaa
SHA1 hash:
f0250ebcc2028a33213273a8c4c8c0550efb491c
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Detect_NSIS_Nullsoft_Installer
Author:Obscurity Labs LLC
Description:Detects NSIS installers by .ndata section + NSIS header string
Rule name:PE_Digital_Certificate
Author:albertzsigovits

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments