MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 d1a3f5513cfaf506e96e6304d259fb03f5dc23542301fc9c7335a6e921ad65f9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
GuLoader
Vendor detections: 9
| SHA256 hash: | d1a3f5513cfaf506e96e6304d259fb03f5dc23542301fc9c7335a6e921ad65f9 |
|---|---|
| SHA3-384 hash: | 33a0be80539d9f626a3a127f3a1c1aac3cf7ee11fdcc4e6b5b12c668c53e15c6c581ff847be07c09db34406ccb321f22 |
| SHA1 hash: | f4488a79fcb657eb1f3f23c6ce181ae7176fb11c |
| MD5 hash: | 8906fa5fed7b1d3d2e5579d97419c076 |
| humanhash: | twenty-moon-burger-bluebird |
| File name: | Foreign_Bank Account Details.exe |
| Download: | download sample |
| Signature | GuLoader |
| File size: | 135'168 bytes |
| First seen: | 2021-10-12 07:23:47 UTC |
| Last seen: | 2021-10-12 08:16:51 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 0a8e5f9658f839d07c08aa4f38837bac (8 x GuLoader) |
| ssdeep | 3072:wHohMc/81QScUhU7FeiRaz+7kOMr7d2PhOdnXhWZ2QLqw9mh7ObETDuvTuqZccm4:wHoBzsuRcw4rCh |
| TLSH | T1DDD3D511E5CEDD55CA46817D4C42835BBF6A3E424CC2292B3E5E16C83FFA9217690BCE |
| File icon (PE): | |
| dhash icon | 1003873d31213f10 (142 x DarkCloud, 132 x GuLoader, 35 x a310Logger) |
| Reporter | |
| Tags: | exe GuLoader |
Intelligence
File Origin
# of uploads :
2
# of downloads :
179
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Foreign_Bank Account Details.exe
Verdict:
No threats detected
Analysis date:
2021-10-12 07:31:48 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Result
Verdict:
Clean
Maliciousness:
Behaviour
Creating a window
Verdict:
Suspicious
Threat level:
5/10
Confidence:
67%
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Malicious
Result
Threat name:
RemCom RemoteAdmin Mimikatz HawkEye Immi
Detection:
malicious
Classification:
rans.troj.evad.spre.adwa.spyw.expl.mine
Score:
100 / 100
Signature
Antivirus detection for URL or domain
Binary or sample is protected by dotNetProtector
C2 URLs / IPs found in malware configuration
Contains functionality to hide user accounts
Contains VNC / remote desktop functionality (version string found)
Deletes shadow drive data (may be related to ransomware)
Detected Hacktool Mimikatz
Detected HawkEye Rat
Detected Imminent RAT
Detected Nanocore Rat
Detected Remcos RAT
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found potential ransomware demand text
Found string related to ransomware
Found strings related to Crypto-Mining
Found Tor onion address
GuLoader behavior detected
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Malicious sample detected (through community Yara rule)
May drop file containing decryption instructions (likely related to ransomware)
May enable test signing (to load unsigned drivers)
May modify the system service descriptor table (often done to hook functions)
Modifies the hosts file
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Potential malicious icon found
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sample is not signed and drops a device driver
Sigma detected: RegAsm connects to smtp port
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file access)
Writes to foreign memory regions
Yara detected 0x0M4R Ransomware
Yara detected AESCRYPT Ransomware
Yara detected AgentTesla
Yara detected AllatoriJARObfuscator
Yara detected Amnesia ransomware
Yara detected Annabelle Ransomware
Yara detected AntiVM3
Yara detected Apis Ransomware
Yara detected Artemon Ransomware
Yara detected Autohotkey Downloader Generic
Yara detected Avaddon Ransomware
Yara detected AveMaria stealer
Yara detected Axiom Ransomware
Yara detected Babuk Ransomware
Yara detected Betabot
Yara detected BitCoin Miner
Yara detected BLACKMatter Ransomware
Yara detected BlackMoon Ransomware
Yara detected Buran Ransomware
Yara detected ByteLocker Ransomware
Yara detected Cerber ransomware
Yara detected Chaos Ransomware
Yara detected Clay Ransomware
Yara detected Clop Ransomware
Yara detected Cobra Locker ransomware
Yara detected Codoso Ghost
Yara detected Coinhive miner
Yara detected Conti ransomware
Yara detected Costura Assembly Loader
Yara detected Covid19 Ransomware
Yara detected CryLock ransomware
Yara detected Crypt ransomware
Yara detected Cryptolocker ransomware
Yara detected Cute Ransomware
Yara detected DarkSide Ransomware
Yara detected Delta Ransomware
Yara detected Discord Token Stealer
Yara detected Dorkbot
Yara detected Evrial Stealer
Yara detected Fiesta Ransomware
Yara detected Generic Dropper
Yara detected generic Shellcode Injector
Yara detected GhostRat
Yara detected Globeimposter Ransomware
Yara detected GlobeLocker Ransomware
Yara detected Gocoder ransomware
Yara detected GoGoogle ransomware
Yara detected Growtopia
Yara detected GuLoader
Yara detected Hancitor
Yara detected HiddenTear ransomware
Yara detected ISRStealer
Yara detected Jcrypt Ransomware
Yara detected Jigsaw
Yara detected Koadic
Yara detected LaZagne password dumper
Yara detected LazParking Ransomware
Yara detected LimeRAT
Yara detected Linux EvilGnome RC5 key
Yara detected LockBit ransomware
Yara detected LOCKFILE ransomware
Yara detected LokiLocker Ransomware
Yara detected Lolkek Ransomware
Yara detected MailPassView
Yara detected Mailto ransomware
Yara detected Marvel Ransomware
Yara detected MegaCortex Ransomware
Yara detected Metasploit Payload
Yara detected Meterpreter
Yara detected Mimikatz
Yara detected Mini RAT
Yara detected Mock Ransomware
Yara detected MSILLoadEncryptedAssembly
Yara detected Nemty Ransomware
Yara detected Netwalker ransomware
Yara detected NetWire RAT
Yara detected Niros Ransomware
Yara detected Njrat
Yara detected NoCry Ransomware
Yara detected Nukesped
Yara detected OCT Ransomware
Yara detected Ouroboros ransomware
Yara detected Parallax RAT
Yara detected PasteDownloader
Yara detected Pony
Yara detected Porn Ransomware
Yara detected Predator
Yara detected Ragnarok ransomware
Yara detected RansomwareGeneric
Yara detected Rapid ransomware
Yara detected RegretLocker Ransomware
Yara detected RekenSom ransomware
Yara detected RevengeRAT
Yara detected Rhino ransomware
Yara detected Ryuk ransomware
Yara detected Silvertor Ransomware
Yara detected Snake Keylogger
Yara detected Snatch Ransomware
Yara detected Telegram RAT
Yara detected TeslaCrypt Ransomware
Yara detected Thanos ransomware
Yara detected UACMe UAC Bypass tool
Yara detected Valak
Yara detected VB6 Downloader Generic
Yara detected VBKeyloggerGeneric
Yara detected VHD ransomware
Yara detected Vidar stealer
Yara detected Voidcrypt Ransomware
Yara detected Wannacry ransomware
Yara detected WannaRen ransomware
Yara detected Windows Security Disabler
Yara detected WormLocker Ransomware
Yara detected Xmrig cryptocurrency miner
Yara detected Zeoticus ransomware
Yara detected Zeppelin Ransomware
Behaviour
Behavior Graph:
Detection:
guloader
Threat name:
Win32.Trojan.FormBook
Status:
Malicious
First seen:
2021-10-12 06:22:32 UTC
AV detection:
11 of 36 (30.56%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Result
Malware family:
guloader
Score:
10/10
Tags:
family:guloader downloader
Behaviour
Suspicious use of SetWindowsHookEx
Guloader,Cloudeye
Unpacked files
SH256 hash:
d1a3f5513cfaf506e96e6304d259fb03f5dc23542301fc9c7335a6e921ad65f9
MD5 hash:
8906fa5fed7b1d3d2e5579d97419c076
SHA1 hash:
f4488a79fcb657eb1f3f23c6ce181ae7176fb11c
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Legit
Score:
0.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropped by
guloader
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.