MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c01173f818eaf0ed530c4831f5b61e207498f606c2f61141aaf8ffc1ef62bd28. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: c01173f818eaf0ed530c4831f5b61e207498f606c2f61141aaf8ffc1ef62bd28
SHA3-384 hash: bc018455bac317404aa77c9138e845eb733144a2f1f9e0f01213cc77491b8e352331848a138c059ea0200b6e4fbe66c1
SHA1 hash: 7ba567a092e3f4773bc1dcbf21098de1e318b396
MD5 hash: 180b92af76a199b2956d5c7f180e8071
humanhash: quebec-hawaii-leopard-lactose
File name:e-dekont.pdf.exe
Download: download sample
Signature GuLoader
File size:110'592 bytes
First seen:2020-06-05 13:38:11 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 47440788f5e8ae12aae18fb6795e2c5b (1 x GuLoader)
ssdeep 3072:4rdhd4gF/EmruZjl8myUza52zXujqb0foYSsf:4Z4gJdYAP
Threatray 947 similar samples on MalwareBazaar
TLSH 44B3732BA969BC6CD1C97DF0BC25A49713163C147B44A6BE12D0FBBCB630AE26C51707
Reporter abuse_ch
Tags:exe geo GuLoader TUR ZiraatBank


Avatar
abuse_ch
Malspam distributing GuLoader:

HELO: server.doklsa.us
Sending IP: 45.146.255.187
From: ZIRAAT BANKASI <ziraat@ileti.ziraatbank.com.tr>
Subject: e-dekont
Attachment: e-dekont.pdf.img (contains "e-dekont.pdf.exe")

GuLoader payload URL:
http://vitaltea.co.nz/ned/kris-stub_tPvCfLzh221.bin

Intelligence


File Origin
# of uploads :
1
# of downloads :
96
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Vebzenpak
Status:
Malicious
First seen:
2020-06-05 13:40:06 UTC
AV detection:
22 of 31 (70.97%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of NtSetInformationThreadHideFromDebugger
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

affc5f7322e456c4c0216c2c99322cbb

GuLoader

Executable exe c01173f818eaf0ed530c4831f5b61e207498f606c2f61141aaf8ffc1ef62bd28

(this sample)

  
Dropped by
MD5 affc5f7322e456c4c0216c2c99322cbb
  
Delivery method
Distributed via e-mail attachment

Comments