MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d4f504a85af7c8661492ea1a331220b4101db3e91a56fa0855dbedc0b9a9c1a3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: d4f504a85af7c8661492ea1a331220b4101db3e91a56fa0855dbedc0b9a9c1a3
SHA3-384 hash: 9bfcbd96fb659f9c3b76f2ea3b4a277baf47d082cecab1792986f2b1f5ecca487a337d272295d16c82a53baaa833fa16
SHA1 hash: 3f17284fa95ed35282100f1918a8f03a1fc73d7c
MD5 hash: 9b449d95c179e8ba45c34b9d3c941950
humanhash: missouri-seventeen-utah-speaker
File name:Odeme II.exe
Download: download sample
Signature GuLoader
File size:69'632 bytes
First seen:2020-03-19 13:17:40 UTC
Last seen:2020-03-19 14:59:09 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash edf2e7abc64a31c1ad6a8ad8791891a5 (1 x GuLoader)
ssdeep 1536:rpqtQfe7aTPLyxGm0uJlHqUBSuYOAUvsluln3i:FqtQfe7Iy10+l3SLU5i
Threatray 869 similar samples on MalwareBazaar
TLSH 37635AA9E0F58CCAC81467F7CED7D27E44D27A17AA250B448C14FF7E08B6A486A3D560
Reporter ffforward
Tags:exe GuLoader

Intelligence


File Origin
# of uploads :
2
# of downloads :
90
Origin country :
n/a
Vendor Threat Intelligence
Result
Threat name:
Unknown
Detection:
malicious
Classification:
rans.evad
Score:
76 / 100
Behaviour
Behavior Graph:
n/a
Gathering data
Threat name:
Win32.Trojan.Injector
Status:
Malicious
First seen:
2020-03-16 18:32:20 UTC
File Type:
PE (Exe)
Extracted files:
6
AV detection:
24 of 30 (80.00%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Distributed via e-mail link

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
VB_APILegacy Visual Basic API usedMSVBVM60.DLL::EVENT_SINK_AddRef

Comments