MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 c7ffd915a436362423fa08dcf1a834414c49aac7dc8357f460252d36e073da8c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
GuLoader
Vendor detections: 4
| SHA256 hash: | c7ffd915a436362423fa08dcf1a834414c49aac7dc8357f460252d36e073da8c |
|---|---|
| SHA3-384 hash: | 59170d54da285554a4cc82dceb8cbcb8b57798b19bd839778a7ccfb547ef798dcf9aaecada8a40dc86a4ff7a6764c430 |
| SHA1 hash: | 76597a0475c56dff0782dde6a412b36c403e9370 |
| MD5 hash: | 44f6b6cbe28f768bede398c515163c6a |
| humanhash: | lactose-carolina-mountain-nine |
| File name: | Bestride.exe |
| Download: | download sample |
| Signature | GuLoader |
| File size: | 110'592 bytes |
| First seen: | 2020-06-03 13:32:29 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 1cc5e4409f9ce2ba12b08f9a89c6a2f8 (8 x GuLoader) |
| ssdeep | 1536:ZASPfxV40vfGJ5/kgrKHxLdGKc+o0FDHdZ1gIToovLYbnL2VJ+PIV0:ZpPXv+fKVdhjFD9zPvCLOV0 |
| Threatray | 594 similar samples on MalwareBazaar |
| TLSH | 53B37B13EC0D8A13D5648BBD2D179E793B1DA81D0C405FEF7179AE9BAE312422CA711E |
| Reporter | |
| Tags: | exe GuLoader |
abuse_ch
Malspam distributing GuLoader:HELO: panel.oversea.email
Sending IP: 2.56.8.253
From: info@oversea.email
Subject: Pagamento Recusado
Attachment: FA2020.05.096447.DOC.IMG (contains "Bestride.exe")
GuLoader payload URL:
https://onedrive.live.com/Download?cid=3BCD34D8AC2D7789&resid=3BCD34D8AC2D7789%21432&authkey=AA_NpSuPYqB2kgE
Intelligence
File Origin
# of uploads :
1
# of downloads :
70
Origin country :
n/a
Vendor Threat Intelligence
Detection:
n/a
Detection(s):
Gathering data
Threat name:
Win32.Trojan.Razy
Status:
Malicious
First seen:
2020-06-03 13:37:58 UTC
AV detection:
28 of 47 (59.57%)
Threat level:
2/5
Detection(s):
Malicious file
Verdict:
malicious
Label(s):
guloader
Similar samples:
+ 584 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
5/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of NtSetInformationThreadHideFromDebugger
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.