MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 defaa7299868b133e17be2d9e306ffe90b6fee35f5efdc6b234593f5321d9ee5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 11


Intelligence 11 IOCs YARA 2 File information Comments

SHA256 hash: defaa7299868b133e17be2d9e306ffe90b6fee35f5efdc6b234593f5321d9ee5
SHA3-384 hash: 1a36448e393861d718fc15a33538a30238dc2236bf565d62d01cfc0fc1a9fba067c2c8acfc09cc20060234e41856a34b
SHA1 hash: d210967af8b70a6bd65497d01be792504b8b399c
MD5 hash: e82d84a9b47dad83382f58975cdd983c
humanhash: table-gee-batman-glucose
File name:Certificado FNMT.exe
Download: download sample
Signature GuLoader
File size:770'268 bytes
First seen:2023-10-10 12:49:13 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 671f2a1f8aee14d336bab98fea93d734 (198 x GuLoader, 4 x Formbook, 4 x RemcosRAT)
ssdeep 12288:M0f2JEhxe+fYm6bkAxfRE+K/8eY3uWe5M055BQeweXtTYVNPvwfj9HBrRYzzpTe:M0foEhxe+f/gkMLK/5KhqM05IE9T2PoL
Threatray 299 similar samples on MalwareBazaar
TLSH T107F42302B6A4EC27D42D02738DBBE5EC6FB8BD5A5DE1024B37A4772E2C77641B90D205
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter malwarelabnet
Tags:exe GuLoader

Intelligence


File Origin
# of uploads :
1
# of downloads :
285
Origin country :
CA CA
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
f3f99cff-bc6e-1d09-287b-c4b400e267e5.eml
Verdict:
Malicious activity
Analysis date:
2023-10-10 11:39:56 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Creating a window
Creating a file
Delayed reading of the file
Searching for the window
Creating a file in the %temp% subdirectories
Searching for the Windows task manager window
Launching a process
Creating a process with a hidden window
Sending a custom TCP request
Gathering data
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
control lolbin overlay packed remcos shell32 threat virus
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
GuLoader
Detection:
malicious
Classification:
troj.evad.spyw
Score:
84 / 100
Signature
Maps a DLL or memory area into another process
Mass process execution to delay analysis
Multi AV Scanner detection for submitted file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected GuLoader
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1322913 Sample: Certificado_FNMT.exe Startdate: 10/10/2023 Architecture: WINDOWS Score: 84 43 googlehosted.l.googleusercontent.com 2->43 45 drive.google.com 2->45 47 3 other IPs or domains 2->47 55 Multi AV Scanner detection for submitted file 2->55 57 Yara detected GuLoader 2->57 9 Certificado_FNMT.exe 1 43 2->9         started        signatures3 process4 file5 39 C:\Users\user\AppData\Local\...\nsExec.dll, PE32 9->39 dropped 41 C:\Users\user\AppData\Local\...\System.dll, PE32 9->41 dropped 59 Writes to foreign memory regions 9->59 61 Mass process execution to delay analysis 9->61 63 Maps a DLL or memory area into another process 9->63 13 CasPol.exe 9->13         started        17 powershell.exe 9->17         started        19 powershell.exe 9->19         started        21 78 other processes 9->21 signatures6 process7 dnsIp8 49 api4.ipify.org 104.237.62.212, 443, 49762 WEBNXUS United States 13->49 51 googlehosted.l.googleusercontent.com 142.250.72.161, 443, 49761 GOOGLEUS United States 13->51 53 drive.google.com 142.251.40.46, 443, 49760 GOOGLEUS United States 13->53 65 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 13->65 67 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 13->67 69 Tries to steal Mail credentials (via file / registry access) 13->69 71 Tries to harvest and steal browser information (history, passwords, etc) 13->71 23 conhost.exe 17->23         started        25 conhost.exe 19->25         started        27 conhost.exe 21->27         started        29 conhost.exe 21->29         started        31 conhost.exe 21->31         started        33 75 other processes 21->33 signatures9 process10 process11 35 MpCmdRun.exe 23->35         started        37 conhost.exe 25->37         started       
Threat name:
Win32.Trojan.Guloader
Status:
Malicious
First seen:
2023-10-10 00:23:27 UTC
File Type:
PE (Exe)
Extracted files:
9
AV detection:
16 of 22 (72.73%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Loads dropped DLL
Unpacked files
SH256 hash:
bcb93204bd1854d0c34fa30883bab51f6813ab32abf7fb7d4aeed21d71f6af87
MD5 hash:
6c881f00ba860b17821d8813aa34dbc6
SHA1 hash:
0e5a1e09b1ce1bc758d6977b913a8d9ccbe52a13
SH256 hash:
832da3cff792135ecb98f44c387bea3a8e2e9bd096b917303ca8b9dc71d60365
MD5 hash:
50a9396a761bf245ed4df1b08782d6f2
SHA1 hash:
e01a99100e91801abe074341b0c77cca6220f0bd
SH256 hash:
dcfd594bee64b7779fde26879a47cc5c5bfabeb3ed7752013c0ef4d045e601de
MD5 hash:
0b395e1ca2caa72c1a44517c0cd832fc
SHA1 hash:
d51d44e4e0dc1f78acd9001f219a5770ce5d4ece
SH256 hash:
defaa7299868b133e17be2d9e306ffe90b6fee35f5efdc6b234593f5321d9ee5
MD5 hash:
e82d84a9b47dad83382f58975cdd983c
SHA1 hash:
d210967af8b70a6bd65497d01be792504b8b399c
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Ins_NSIS_Buer_Nov_2020_1
Author:Arkbird_SOLG
Description:Detect NSIS installer used for Buer loader
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments