MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c86adaa9802afda5346e7b351ebe646dcf3bdeff37af3beb9f72b2bf42d2b5e2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: c86adaa9802afda5346e7b351ebe646dcf3bdeff37af3beb9f72b2bf42d2b5e2
SHA3-384 hash: 92001650ee468cf7fb7f80175a47d70a0a7044b804266c6f9c34522a12bc2077a08afff1d14c6bb6fbe4c8131870cd51
SHA1 hash: bee1e519682144b7d6ae70233b585095dfa7d71f
MD5 hash: e11c962c564678430583982c79947a99
humanhash: cat-rugby-nitrogen-coffee
File name:Health-E-Book·pdf.exe
Download: download sample
Signature GuLoader
File size:102'400 bytes
First seen:2020-03-30 10:26:50 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 3a10a92fd8f179c2dd7149983658ad0f (1 x GuLoader)
ssdeep 1536:kdQNTwwv5MHbeHShhs11YXI0o1bcaeMFWTkMaHyx:eVwvSiWhmKY0m7A
Threatray 647 similar samples on MalwareBazaar
TLSH 27A3D712FD00BC94E5284DB687718B8D63067E2A6E19BE43359C3ECF7AF12547142E9B
Reporter abuse_ch
Tags:COVID-19 exe GuLoader


Avatar
abuse_ch
COVID-19 themed malspam campaign distributing GuLoader->AveMariaRAT:

HELO: server.yafuzsport.com
Sending IP: 148.251.119.5
From: WHO: World Health Organization <who_advise@who.int>
Subject: Alerting Consumers
Attachment: Health-E-Book·pdf.zip (contains "Health-E-Book·pdf.exe")

GuLoader payload URL (AveMariaRAT):
https://drive.google.com/uc?export=download&id=1boC4iE-cB85KxGFqXp7XyEv8UYq-2Y0C

Intelligence


File Origin
# of uploads :
1
# of downloads :
92
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Fareit
Status:
Malicious
First seen:
2020-03-30 05:12:55 UTC
File Type:
PE (Exe)
Extracted files:
6
AV detection:
25 of 30 (83.33%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Dropping
AveMariaRAT
  
Delivery method
Distributed via e-mail attachment

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
VB_APILegacy Visual Basic API usedMSVBVM60.DLL::__vbaObjSetAddref
MSVBVM60.DLL::EVENT_SINK_AddRef

Comments