MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 e67d2cc87cb3ad2084b0ff023029653544bf2e343cdbe4c3ca205a9764f6f8b1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
GuLoader
Vendor detections: 4
| SHA256 hash: | e67d2cc87cb3ad2084b0ff023029653544bf2e343cdbe4c3ca205a9764f6f8b1 |
|---|---|
| SHA3-384 hash: | 8684af51857eb9d1e2868296f01b61433527067365ca2017117e0f272282ad9a51490bc7e1f6026e28b4c18c0762f699 |
| SHA1 hash: | 007505d644ccc9f09e90226069c7da7f43cde0d9 |
| MD5 hash: | 079530d50b37883ca0546cb5320355f5 |
| humanhash: | eleven-magnesium-carolina-yankee |
| File name: | Urgent Full Charter Request.exe |
| Download: | download sample |
| Signature | GuLoader |
| File size: | 131'072 bytes |
| First seen: | 2020-06-04 15:55:00 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 643f5af2c5d6e03000939f0b4429e235 (1 x GuLoader) |
| ssdeep | 3072:2fEcuDyn+5ZWns79mjHotk3PV55hkXuliilk+q+fp:2scuDD5ZWn/jIS3PV6WJk+qa |
| Threatray | 959 similar samples on MalwareBazaar |
| TLSH | 26D36B033D58CB15D48519F17CA39C5D361B6A089E4026BF1098EFEFAE712A2ACD671F |
| Reporter | |
| Tags: | exe GuLoader |
abuse_ch
Malspam distributing GuLoader:From: Ahmed Shajeer <ahmed.shajeer@hadid.aero>
Reply-To: Ahmed Shajeer <aviaoffice2@gmail.com>
Subject: Urgent Full Charter Flight Request
Attachment: Urgent Full Charter Request_PDF.r00 (contains "Urgent Full Charter Request.exe")
GuLoader payload URL:
https://drive.google.com/uc?export=download&id=1gQGYaCzfmfcQT3TN2VHzlT3W8bMe7aWO
Intelligence
File Origin
# of uploads :
1
# of downloads :
86
Origin country :
n/a
Vendor Threat Intelligence
Detection:
n/a
Detection(s):
Gathering data
Threat name:
Win32.Trojan.Fareit
Status:
Malicious
First seen:
2020-06-04 16:36:54 UTC
AV detection:
9 of 31 (29.03%)
Threat level:
5/5
Detection(s):
Malicious file
Verdict:
malicious
Label(s):
guloader
Similar samples:
+ 949 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
5/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of NtSetInformationThreadHideFromDebugger
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.