MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f13e6a63744c56a4815ebc9421b869c5a30a539a4053a6bf057f98cf79c06ed5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: f13e6a63744c56a4815ebc9421b869c5a30a539a4053a6bf057f98cf79c06ed5
SHA3-384 hash: b4077da1d199e3088240d2aae13473b94e8e2f4dd9748f94b06129b32b6dd399d92514cf0ba49c024829070dc2656dc1
SHA1 hash: dd888e59e88a7f201a0875f53505ca08f9be8eb9
MD5 hash: af0d2154949b4de84f1bac61ed4d8a56
humanhash: aspen-seven-jig-dakota
File name:af0d2154949b4de84f1bac61ed4d8a56.exe
Download: download sample
Signature GuLoader
File size:61'440 bytes
First seen:2020-05-31 22:28:20 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash dee8c782a133a9b862c30d5fb1d39975 (1 x GuLoader)
ssdeep 768:ZHdXudQiyYo4cUEaant4eFwia4MCvJ8uhFSFS+4IDSBJSSiFzrTo47i:Z9+vyYCUxeCCvJfFSSIDSHSS6fT
Threatray 657 similar samples on MalwareBazaar
TLSH F1536D27BD0D9012E21ACAF195B1E5B17B26BC5515026F0B3644AFAAEC316C37DF132E
Reporter abuse_ch
Tags:exe GuLoader


Avatar
abuse_ch
GuLoader payload URL:
https://drive.google.com/uc?export=download&id=17Irk7CsOVf6UyFatXo90zofxIfHB9ERn

Intelligence


File Origin
# of uploads :
1
# of downloads :
73
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Injector
Status:
Malicious
First seen:
2020-05-31 22:35:24 UTC
AV detection:
20 of 31 (64.52%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of NtSetInformationThreadHideFromDebugger
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

GuLoader

Executable exe f13e6a63744c56a4815ebc9421b869c5a30a539a4053a6bf057f98cf79c06ed5

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments