MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 d53823a77a528f3e34ddde64b0a9f6ca5f806fdc4e08ed0f38c384629bf16e9b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 3
| SHA256 hash: | d53823a77a528f3e34ddde64b0a9f6ca5f806fdc4e08ed0f38c384629bf16e9b |
|---|---|
| SHA3-384 hash: | c880c4cd7bd2c07a98667f75df3d54a16babf36f7cf6606f7cc28c6172b08d573e064e04fda550c55dfff78c36b5f240 |
| SHA1 hash: | acf0c7160aa97cceb11332947e9d4c26b27aab85 |
| MD5 hash: | cf00f0fd155033379789156173f2d1ab |
| humanhash: | virginia-lamp-six-mango |
| File name: | cf00f0fd155033379789156173f2d1ab.exe |
| Download: | download sample |
| File size: | 255'488 bytes |
| First seen: | 2020-04-04 17:11:02 UTC |
| Last seen: | 2020-04-08 12:52:16 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | d54856e90bade24074537e8303268776 (1 x RemcosRAT) |
| ssdeep | 3072:mCSTQu2l2ndToq2rKmsi1lYte4YQgTHnCfkztOEZG0tTCWeRo+6QlVTypjLca8dp:ZSb2lCqrKiaECkNG0tTCoemErfmC |
| Threatray | 340 similar samples on MalwareBazaar |
| TLSH | F744E023F4C184B6C15226BC8D0BA695B43EFE263F64546BAADE3D4E4FEF180241C4D6 |
| Reporter | |
| Tags: | exe GuLoader |
abuse_ch
Payload dropped by GuLoader from the following URL:daolnwod=tropxe&zwllZlY4swdqSsTqephOruzo50fQ7i4r1=di?cu/0/u/moc.elgoog.evird//:sptth
Intelligence
File Origin
Vendor Threat Intelligence
File information
The table below shows additional information about this malware sample such as delivery method and external references.
60ef0e2cfdfffab61008a07805ef5c0809407cc2d50c084a254f03573c92c0cd
dll d53823a77a528f3e34ddde64b0a9f6ca5f806fdc4e08ed0f38c384629bf16e9b
(this sample)
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_NX | Missing Non-Executable Memory Protection | critical |
| CHECK_PIE | Missing Position-Independent Executable (PIE) Protection | high |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| SHELL_API | Manipulates System Shell | shell32.dll::ShellExecuteA |
| URL_MONIKERS_API | Can Download & Execute components | URLMON.DLL::URLDownloadToFileA |
| WIN32_PROCESS_API | Can Create Process and Threads | kernel32.dll::CreateRemoteThread kernel32.dll::CreateProcessA kernel32.dll::VirtualAllocEx kernel32.dll::WriteProcessMemory kernel32.dll::CloseHandle |
| WIN_BASE_API | Uses Win Base API | kernel32.dll::LoadLibraryExA kernel32.dll::LoadLibraryA kernel32.dll::GetStartupInfoA kernel32.dll::GetDiskFreeSpaceA kernel32.dll::GetCommandLineA |
| WIN_BASE_IO_API | Can Create Files | kernel32.dll::CreateDirectoryA kernel32.dll::CreateFileA kernel32.dll::DeleteFileA kernel32.dll::GetFileAttributesA kernel32.dll::FindFirstFileA |
| WIN_REG_API | Can Manipulate Windows Registry | advapi32.dll::RegCreateKeyExA advapi32.dll::RegOpenKeyExA advapi32.dll::RegQueryValueExA advapi32.dll::RegSetValueExA |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.