MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cba8e79b90c98fe396da2d0243e1c98b13bdf586b8e60034be52fe6efdc42ce8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 12


Intelligence 12 IOCs YARA 2 File information Comments 1

SHA256 hash: cba8e79b90c98fe396da2d0243e1c98b13bdf586b8e60034be52fe6efdc42ce8
SHA3-384 hash: 2259d11befca05d291b498aa5bfab8feb1eefa743fd96d7c3c8da0c34f486a1c3cf2672caff944d23ea598b583adbf2f
SHA1 hash: ba7f4fa34407045e333fea4f49d795844992574d
MD5 hash: 979a11816b81b41c9eb385532b3f01a7
humanhash: colorado-march-quiet-maine
File name:979a11816b81b41c9eb385532b3f01a7
Download: download sample
Signature GuLoader
File size:605'064 bytes
First seen:2023-02-15 14:12:06 UTC
Last seen:2023-02-15 15:43:25 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 57e98d9a5a72c8d7ad8fb7a6a58b3daf (60 x GuLoader, 20 x AZORult, 12 x RemcosRAT)
ssdeep 6144:/alZZ0waYLO/zKp40wCU5ZdGADzZwUlfpT29w5QMrXEEH5e:GZS/Jz5bCUlNrNpTOwQEHc
TLSH T15BD4E0277B6BC846D021B5FC65739A4C1A799D033E1EEE1392D5767D6AB828C280F0C7
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon a644fcfef0a9a206 (1 x GuLoader, 1 x Formbook)
Reporter zbetcheckin
Tags:32 exe GuLoader signed

Code Signing Certificate

Organisation:Wrabbe
Issuer:Wrabbe
Algorithm:sha256WithRSAEncryption
Valid from:2022-07-21T16:36:50Z
Valid to:2025-07-20T16:36:50Z
Serial number: -2884152b4de497c0
Thumbprint Algorithm:SHA256
Thumbprint: 29fccd81db0d5d910584bc167c66001f2a7c2c997f1fa554e988f4fc1339d003
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
194
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
979a11816b81b41c9eb385532b3f01a7
Verdict:
Malicious activity
Analysis date:
2023-02-15 14:40:56 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Searching for the window
Creating a window
Creating a file
Delayed reading of the file
Searching for the Windows task manager window
Running batch commands
Creating a process with a hidden window
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
buer overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook, GuLoader
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file contains section with special chars
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect Any.run
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected FormBook
Yara detected GuLoader
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 809208 Sample: WpPPx8yVOV.exe Startdate: 16/02/2023 Architecture: WINDOWS Score: 100 56 www.wutongkorea.com 2->56 58 www.wish-hunter.com 2->58 60 22 other IPs or domains 2->60 80 Snort IDS alert for network traffic 2->80 82 Malicious sample detected (through community Yara rule) 2->82 84 Antivirus detection for URL or domain 2->84 86 6 other signatures 2->86 11 WpPPx8yVOV.exe 2 31 2->11         started        signatures3 process4 file5 48 C:\Users\user\Fumigate\...\super_pi_mod.exe, MS-DOS 11->48 dropped 50 C:\Users\...\Microsoft.Practices.Unity2.dll, PE32+ 11->50 dropped 52 C:\Users\user\Fumigate\...\MapiProxy.dll, PE32 11->52 dropped 54 2 other files (none is malicious) 11->54 dropped 98 Obfuscated command line found 11->98 100 Tries to detect Any.run 11->100 15 WpPPx8yVOV.exe 11->15         started        19 cmd.exe 1 11->19         started        21 cmd.exe 1 11->21         started        23 271 other processes 11->23 signatures6 process7 dnsIp8 68 109.206.240.194, 49841, 80 AWMLTNL Germany 15->68 70 192.168.11.1 unknown unknown 15->70 72 Modifies the context of a thread in another process (thread injection) 15->72 74 Tries to detect Any.run 15->74 76 Maps a DLL or memory area into another process 15->76 78 2 other signatures 15->78 25 explorer.exe 15->25 injected 29 conhost.exe 19->29         started        31 conhost.exe 21->31         started        33 conhost.exe 23->33         started        35 conhost.exe 23->35         started        37 conhost.exe 23->37         started        39 268 other processes 23->39 signatures9 process10 dnsIp11 62 www.no-leaks.com 156.226.207.81, 49855, 49856, 49857 XIAOZHIYUN1-AS-APICIDCNETWORKUS Seychelles 25->62 64 www.wish-hunter.com 91.195.240.117, 49889, 49890, 49891 SEDO-ASDE Germany 25->64 66 14 other IPs or domains 25->66 96 System process connects to network (likely due to code injection or exploit) 25->96 41 wlanext.exe 25->41         started        signatures12 process13 signatures14 88 Tries to steal Mail credentials (via file / registry access) 41->88 90 Tries to harvest and steal browser information (history, passwords, etc) 41->90 92 Writes to foreign memory regions 41->92 94 3 other signatures 41->94 44 firefox.exe 41->44         started        process15 process16 46 WerFault.exe 44->46         started       
Threat name:
Win32.Trojan.Guloader
Status:
Malicious
First seen:
2023-02-13 09:32:39 UTC
File Type:
PE (Exe)
Extracted files:
11
AV detection:
7 of 39 (17.95%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
guloader
Score:
  10/10
Tags:
family:guloader downloader
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Windows directory
Suspicious use of NtCreateThreadExHideFromDebugger
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Checks QEMU agent file
Loads dropped DLL
Guloader,Cloudeye
Unpacked files
SH256 hash:
319d8eefa26bbafdd428065c3d150fd683d1a0d7d211396ebcb89f78b591b4ba
MD5 hash:
6b76f40ee66cc720ba6903d47166f912
SHA1 hash:
a3944092feee65097ff7d0a990bda9db32c2225b
SH256 hash:
a0cac4cf4852895619bc7743ebeb89f9e4927ccdb9e66b1bcd92a4136d0f9c77
MD5 hash:
b0c77267f13b2f87c084fd86ef51ccfc
SHA1 hash:
f7543f9e9b4f04386dfbf33c38cbed1bf205afb3
SH256 hash:
cba8e79b90c98fe396da2d0243e1c98b13bdf586b8e60034be52fe6efdc42ce8
MD5 hash:
979a11816b81b41c9eb385532b3f01a7
SHA1 hash:
ba7f4fa34407045e333fea4f49d795844992574d
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Ins_NSIS_Buer_Nov_2020_1
Author:Arkbird_SOLG
Description:Detect NSIS installer used for Buer loader
Rule name:win_flawedammyy_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.flawedammyy.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

GuLoader

Executable exe cba8e79b90c98fe396da2d0243e1c98b13bdf586b8e60034be52fe6efdc42ce8

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2023-02-15 14:12:14 UTC

url : hxxp://109.206.240.194/cxz/NEW_ORDER.exe