MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e1940206b5e3300e88b817953a62d90a2e69b738df549dc5da993409a6487ae1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: e1940206b5e3300e88b817953a62d90a2e69b738df549dc5da993409a6487ae1
SHA3-384 hash: 28beb694b3d536d11e196a554537326b513873fa1dd4438e7ff2274f26f32f168204e17dc0f03ff00dab87c0d6af19d7
SHA1 hash: 31fea2ceaeb535863d46ec5260385649c34c0fa0
MD5 hash: 31851bac3685c5641fc16e256c94c4a8
humanhash: bluebird-echo-bulldog-asparagus
File name:DOC 13102021.exe
Download: download sample
Signature GuLoader
File size:139'264 bytes
First seen:2021-10-13 14:18:20 UTC
Last seen:2021-10-13 15:16:50 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash c727a98e677fb7bd25bb06d2a2d956f1 (11 x GuLoader, 1 x Formbook)
ssdeep 3072:8BtA0di9VPKLRp6d1KBRk2e82wzbC8DmE:0tU9kLRpw1KTket+8
Threatray 749 similar samples on MalwareBazaar
TLSH T1E7D381A162B08FD4E4A78A7F67E5476431327E340912AD47F68DBE0E4E761E0D69032F
File icon (PE):PE icon
dhash icon 1003873d31213f10 (142 x DarkCloud, 132 x GuLoader, 35 x a310Logger)
Reporter cocaman
Tags:exe GuLoader

Intelligence


File Origin
# of uploads :
2
# of downloads :
241
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
DOC 13102021.exe
Verdict:
No threats detected
Analysis date:
2021-10-13 14:45:18 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
GuLoader AgentTesla
Detection:
malicious
Classification:
rans.troj.evad.spre.adwa.spyw
Score:
100 / 100
Signature
Found malware configuration
GuLoader behavior detected
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Modifies the hosts file
Multi AV Scanner detection for submitted file
Potential malicious icon found
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: RegAsm connects to smtp port
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file access)
Writes to foreign memory regions
Yara detected AgentTesla
Yara detected GuLoader
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1647 Sample: DOC 13102021.exe Startdate: 13/10/2021 Architecture: WINDOWS Score: 100 26 mail.binaryinfotech.com 2->26 28 binaryinfotech.com 2->28 30 4 other IPs or domains 2->30 38 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->38 40 Potential malicious icon found 2->40 42 Found malware configuration 2->42 44 6 other signatures 2->44 8 DOC 13102021.exe 2->8         started        11 tKZVPq.exe 2 2->11         started        signatures3 process4 signatures5 46 Writes to foreign memory regions 8->46 48 Tries to detect Any.run 8->48 50 Hides threads from debuggers 8->50 13 RegAsm.exe 2 11 8->13         started        18 conhost.exe 11->18         started        process6 dnsIp7 32 binaryinfotech.com 132.148.164.170, 49766, 587 AS-26496-GO-DADDY-COM-LLCUS United States 13->32 34 googlehosted.l.googleusercontent.com 142.250.184.193, 443, 49762 GOOGLEUS United States 13->34 36 drive.google.com 216.58.212.174, 443, 49761 GOOGLEUS United States 13->36 22 C:\Users\user\AppData\Roaming\...\tKZVPq.exe, PE32 13->22 dropped 24 C:\Windows\System32\drivers\etc\hosts, ASCII 13->24 dropped 52 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 13->52 54 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 13->54 56 Tries to steal Mail credentials (via file access) 13->56 58 7 other signatures 13->58 20 conhost.exe 13->20         started        file8 signatures9 process10
Threat name:
Win32.Trojan.Mucc
Status:
Malicious
First seen:
2021-10-13 14:06:49 UTC
AV detection:
10 of 40 (25.00%)
Threat level:
  5/5
Result
Malware family:
guloader
Score:
  10/10
Tags:
family:guloader downloader
Behaviour
Suspicious use of SetWindowsHookEx
Guloader,Cloudeye
Unpacked files
SH256 hash:
e1940206b5e3300e88b817953a62d90a2e69b738df549dc5da993409a6487ae1
MD5 hash:
31851bac3685c5641fc16e256c94c4a8
SHA1 hash:
31fea2ceaeb535863d46ec5260385649c34c0fa0
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

GuLoader

Executable exe e1940206b5e3300e88b817953a62d90a2e69b738df549dc5da993409a6487ae1

(this sample)

Comments