MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e45b4d0e0b338b2a3875466e875b008043acf8240da0d6caa2ec14d13c02fe41. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments 1

SHA256 hash: e45b4d0e0b338b2a3875466e875b008043acf8240da0d6caa2ec14d13c02fe41
SHA3-384 hash: 00d67541887113aff1f89cd2cb054f653efc6fad5606a15e123c0aa9fe15710bee75b641e57c362355e5ae06f8efdd99
SHA1 hash: e28c607306090b9460af1e5c328150fdddecd02f
MD5 hash: 8e3751d6aa2087f8e2445d968281ae4c
humanhash: ink-echo-mango-artist
File name:wire.exe
Download: download sample
Signature GuLoader
File size:55'000 bytes
First seen:2020-05-26 09:15:24 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 02f5282297f61d7beee6055d5fc791a5 (1 x GuLoader)
ssdeep 768:FnFuTvqbki8sDImD6IHPPf5yj0J9PtfnSS/IrHgoNYADl+ih/:hFuTy18PIHP35ew5td/zADd/
Threatray 5'120 similar samples on MalwareBazaar
TLSH C43307E0F5F4503BD273CE70CE32D5F801BB3E7C6A09945B1A6074CB0A79A09E56962B
Reporter abuse_ch
Tags:exe GuLoader

Code Signing Certificate

Organisation:BLUNGE
Issuer:BLUNGE
Algorithm:sha256WithRSAEncryption
Valid from:May 26 02:31:17 2020 GMT
Valid to:May 26 02:31:17 2021 GMT
Serial number: 00
Intelligence: 325 malware samples on MalwareBazaar are signed with this code signing certificate
Cert Central Blocklist:This certificate is on the Cert Central blocklist
Thumbprint Algorithm:SHA256
Thumbprint: 7C488EEC59959D1EC411F025EEEB18F7603E13C6013E454D84EBFEA2D16F022A
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform


Avatar
abuse_ch
Malspam distributing GuLoader:

HELO: mail.huclangia.tk
Sending IP: 64.52.175.227
From: Paul Runyan <slim@huclangia.tk>
Subject: URGENT REQUEST FOR QUOTE
Attachment: URGENT REQUEST FOR QUOTE.img (contains "wire.exe")

GuLoader payload URL:
http://37.72.175.206/bin_QxtrNnsvE191.bin

Intelligence


File Origin
# of uploads :
1
# of downloads :
74
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Injector
Status:
Malicious
First seen:
2020-05-26 09:37:22 UTC
File Type:
PE (Exe)
Extracted files:
6
AV detection:
20 of 30 (66.67%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of NtSetInformationThreadHideFromDebugger
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

GuLoader

Executable exe e45b4d0e0b338b2a3875466e875b008043acf8240da0d6caa2ec14d13c02fe41

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments



Avatar
CAPE Sandbox commented on 2020-05-27 10:16:00 UTC

#Formbook

https://capesandbox.com/analysis/4990/