MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d2f169c37561f240ad256ef7a43adb4d6e9d752f8d5f364ff294820c79edd313. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: d2f169c37561f240ad256ef7a43adb4d6e9d752f8d5f364ff294820c79edd313
SHA3-384 hash: 0b432532be620ca9ffe30f47fafe40db56b38fefb3d9ea8c96ceb3fa615238ade34ece43fec28a58539913c447bfdf9d
SHA1 hash: 60b66a153d5cb47b125ac3c26fa61ddb44ac5fc4
MD5 hash: fb448e042d64304bd75b0a7eaa88d9c6
humanhash: dakota-bluebird-alanine-romeo
File name:DHL-Shipment-Notification#766474849_feb.exe
Download: download sample
Signature GuLoader
File size:143'360 bytes
First seen:2021-02-22 07:30:30 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 3f0d3842f1f621625b7b4016e6be4558 (2 x GuLoader)
ssdeep 1536:fWWTwV4fVhu5+zCGdJL1wTbagPJR+PbqDRJlVuxVQwV4MjW:TwVUPLCGdZ1YmgzWbiRHVQqwV
Threatray 1'678 similar samples on MalwareBazaar
TLSH A9E317A2619AF897E05541335A1D9BF88D709D2B19307803739D3A1F2B39ACD57F03AB
Reporter abuse_ch
Tags:DHL exe GuLoader


Avatar
abuse_ch
Malspam distributing GuLoader:

HELO: mail.sayyess.uno
Sending IP: 62.108.35.214
From: DHL | Global | Express <admin@sayyess.uno>
Subject: DHL Express Shipment Notification #88377493
Attachment: DHL-Shipment-Notification766474849_feb.rar (contains "DHL-Shipment-Notification#766474849_feb.exe")

GuLoader payload URL:
https://waeorat-71.tk/admin/MuNwgeCO242.bin

Intelligence


File Origin
# of uploads :
1
# of downloads :
134
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
48 / 100
Signature
Found potential dummy code loops (likely to delay analysis)
Tries to detect virtualization through RDTSC time measurements
Behaviour
Behavior Graph:
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Unpacked files
SH256 hash:
d2f169c37561f240ad256ef7a43adb4d6e9d752f8d5f364ff294820c79edd313
MD5 hash:
fb448e042d64304bd75b0a7eaa88d9c6
SHA1 hash:
60b66a153d5cb47b125ac3c26fa61ddb44ac5fc4
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

GuLoader

Executable exe d2f169c37561f240ad256ef7a43adb4d6e9d752f8d5f364ff294820c79edd313

(this sample)

Comments