MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e8967b1c2713c3513dc6acc371f01fed7795d86abc59467304980cb5cce762da. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: e8967b1c2713c3513dc6acc371f01fed7795d86abc59467304980cb5cce762da
SHA3-384 hash: bbc0a28c906b00207b5db828bc5ec42ccba2d73e3409d351f860494489a5c468b4d9b886930f5b5068603dc5d28dc446
SHA1 hash: de70120e34d949278717d754508f0a897293ae72
MD5 hash: 6c1053ab0f439e694e5975449d607e3b
humanhash: salami-uniform-magnesium-queen
File name:Payment Slip_pdf.exe
Download: download sample
Signature GuLoader
File size:90'112 bytes
First seen:2020-04-27 05:39:34 UTC
Last seen:2020-04-27 06:49:03 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 5279e6736ec6a45423e4f8a0a051bba2 (1 x GuLoader)
ssdeep 768:7wyEvBCqzjvWwg3+quE59bWaOrTplYZqmNM3fM5wsqLspKQEOWDHX:7wo6iwxaOfpc5kgQV
Threatray 147 similar samples on MalwareBazaar
TLSH 99931A62B6A49CE1D9088DFB1AD0CE495133FC387E4B8B033BD53B6D1A369819B75352
Reporter cocaman
Tags:exe GuLoader

Intelligence


File Origin
# of uploads :
2
# of downloads :
94
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Injector
Status:
Malicious
First seen:
2020-04-27 06:35:26 UTC
File Type:
PE (Exe)
Extracted files:
6
AV detection:
25 of 30 (83.33%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

GuLoader

Executable exe e8967b1c2713c3513dc6acc371f01fed7795d86abc59467304980cb5cce762da

(this sample)

  
Delivery method
Other

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
VB_APILegacy Visual Basic API usedMSVBVM60.DLL::EVENT_SINK_AddRef

Comments