MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f3418e9ec01f4116a2ae079c709ee3c20455d66861951751474dbeb49ab75c26. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: f3418e9ec01f4116a2ae079c709ee3c20455d66861951751474dbeb49ab75c26
SHA3-384 hash: b2e2c978a8069364eb44a1fbf09cf1a014eab9126a62c239b6fac74f356fdf9c29ac09bdfa0836bce09ceb863f9bc669
SHA1 hash: e846b471970f9cec8018c1164ef1f170335ca60f
MD5 hash: 03d84c2efb63b002e4e3061ef2a37598
humanhash: colorado-hamper-high-grey
File name:Order118030620.exe
Download: download sample
Signature GuLoader
File size:110'592 bytes
First seen:2020-06-03 13:29:01 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 5b589e154138236046acdaa7ba7d83f1 (2 x GuLoader)
ssdeep 1536:AwSPfxV40CX8kgrKHxLdGKc+o0FDHdZ1gIxg8swtPLgrO8kncGF/e:AZPXCOKVdhjFD9zlXVPncm/e
Threatray 1'068 similar samples on MalwareBazaar
TLSH 39B38B03EC4D8557D14847BD2D178EBA3A0DB90D0E445FEF717A9E9BAE712421CAB10E
Reporter abuse_ch
Tags:exe GuLoader


Avatar
abuse_ch
Malspam distributing GuLoader:

HELO: mail-m24146.qiye.163.com
Sending IP: 220.194.24.146
From: Sales <shlaien@laien.cn>
Subject: New Order (top urgent)
Attachment: Order118030620.zip (contains "Order118030620.exe")

GuLoader payload URL:
http://legalpros.lawyer/wwed/biggrc_UZMAI73.bin
http://b2ainfotech.com/bwed/biggrc_UZMAI73.bin

Intelligence


File Origin
# of uploads :
1
# of downloads :
73
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Injector
Status:
Malicious
First seen:
2020-06-03 13:38:08 UTC
AV detection:
31 of 48 (64.58%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  6/10
Tags:
persistence
Behaviour
Suspicious behavior: MapViewOfSection
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Adds Run key to start application
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

GuLoader

Executable exe f3418e9ec01f4116a2ae079c709ee3c20455d66861951751474dbeb49ab75c26

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments