MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f79e9b5e468b996d8ef83de29515743682e9457612e1b7a185b1dc6a902104ec. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 9


Intelligence 9 IOCs YARA 1 File information Comments

SHA256 hash: f79e9b5e468b996d8ef83de29515743682e9457612e1b7a185b1dc6a902104ec
SHA3-384 hash: 71e5be7eedb35ce041f98b968b06508dd2de7baf11925e67b29baf67ff0c7221b5130884a913d74e70156a2f431809f8
SHA1 hash: f0db765bd5e8a99e381416d11ad869daa3ba3a32
MD5 hash: cbaf81dcd781156dea6cec56129f8093
humanhash: muppet-johnny-rugby-tennessee
File name:f79e9b5e468b996d8ef83de29515743682e9457612e1b7a185b1dc6a902104ec
Download: download sample
Signature GuLoader
File size:230'624 bytes
First seen:2022-12-06 12:28:56 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash b78ecf47c0a3e24a6f4af114e2d1f5de (304 x GuLoader, 23 x Formbook, 21 x RemcosRAT)
ssdeep 6144:pBe2o72vfH66CZtCk2xrb04GGxmfMszGVgLz6Q7:/oKv/+gro4GquGVgq2
Threatray 1'614 similar samples on MalwareBazaar
TLSH T1963422205DE259F3E893DE300D97EB25E7B1E5009115180B73509FB27A3B7C6DEAB291
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon a0a684cab64307b4 (1 x GuLoader)
Reporter adrian__luca
Tags:exe GuLoader signed

Code Signing Certificate

Organisation:Overheinous
Issuer:Overheinous
Algorithm:sha256WithRSAEncryption
Valid from:2022-08-20T06:45:40Z
Valid to:2025-08-19T06:45:40Z
Serial number: -53689d2e8e735a51
Thumbprint Algorithm:SHA256
Thumbprint: 3a13bb05f866dac4fd4317db65f23b688681df5d7d6d4d857a4e60ec389d281d
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
172
Origin country :
HU HU
Vendor Threat Intelligence
Malware family:
guloader
ID:
1
File name:
f79e9b5e468b996d8ef83de29515743682e9457612e1b7a185b1dc6a902104ec
Verdict:
Malicious activity
Analysis date:
2022-12-06 12:28:42 UTC
Tags:
guloader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Creating a window
Creating a file in the %temp% subdirectories
Creating a file in the %AppData% subdirectories
Delayed reading of the file
Creating a file
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
buer overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook, GuLoader
Detection:
malicious
Classification:
troj.evad.spyw
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect Any.run
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses netsh to modify the Windows network and firewall settings
Writes to foreign memory regions
Yara detected FormBook
Yara detected GuLoader
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 762014 Sample: 5ztB66lDEN.exe Startdate: 06/12/2022 Architecture: WINDOWS Score: 100 37 www.zap46.online 2->37 39 www.yceiei.rest 2->39 41 24 other IPs or domains 2->41 53 Snort IDS alert for network traffic 2->53 55 Malicious sample detected (through community Yara rule) 2->55 57 Antivirus detection for URL or domain 2->57 59 7 other signatures 2->59 10 5ztB66lDEN.exe 6 45 2->10         started        signatures3 process4 file5 31 C:\Users\user\AppData\...\System.IO.Pipes.dll, PE32+ 10->31 dropped 33 C:\Users\user\AppData\Local\...\System.dll, PE32 10->33 dropped 35 C:\Users\user\AppData\Local\...\AdvSplash.dll, PE32 10->35 dropped 71 Tries to detect Any.run 10->71 14 5ztB66lDEN.exe 6 10->14         started        signatures6 process7 dnsIp8 49 drive.google.com 142.250.186.174, 443, 49845 GOOGLEUS United States 14->49 51 googlehosted.l.googleusercontent.com 172.217.16.193, 443, 49846 GOOGLEUS United States 14->51 73 Modifies the context of a thread in another process (thread injection) 14->73 75 Tries to detect Any.run 14->75 77 Maps a DLL or memory area into another process 14->77 79 2 other signatures 14->79 18 RAVCpl64.exe 14->18 injected signatures9 process10 process11 20 netsh.exe 13 18->20         started        23 autochk.exe 18->23         started        signatures12 61 Tries to steal Mail credentials (via file / registry access) 20->61 63 Tries to harvest and steal browser information (history, passwords, etc) 20->63 65 Writes to foreign memory regions 20->65 67 3 other signatures 20->67 25 explorer.exe 20->25 injected 29 firefox.exe 20->29         started        process13 dnsIp14 43 al.djb189djdfaetrdc.com 154.210.210.103, 49882, 49883, 49884 XIAOZHIYUN1-AS-APICIDCNETWORKUS Seychelles 25->43 45 oijnc.xyz 103.96.150.68, 80 WEST263GO-HKWest263InternationalLimitedHK China 25->45 47 13 other IPs or domains 25->47 69 System process connects to network (likely due to code injection or exploit) 25->69 signatures15
Threat name:
Win32.Trojan.Leonem
Status:
Malicious
First seen:
2022-11-27 20:34:47 UTC
File Type:
PE (Exe)
Extracted files:
23
AV detection:
13 of 40 (32.50%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
discovery
Behaviour
Enumerates physical storage devices
Drops file in System32 directory
Checks installed software on the system
Loads dropped DLL
Unpacked files
SH256 hash:
fa4ab1d6f79fd677433a31ada7806373a789d34328da46ccb0449bbf347bd73e
MD5 hash:
3f176d1ee13b0d7d6bd92e1c7a0b9bae
SHA1 hash:
fe582246792774c2c9dd15639ffa0aca90d6fd0b
SH256 hash:
9bf33690090655e91389469beb5dbdd45942192f2e2486c9fa82fa6d74a0f88b
MD5 hash:
15d8eee287329e2030c34c6bb3e62c87
SHA1 hash:
1de23c0883f7a80a489e140c55b16970dd0264ab
SH256 hash:
f79e9b5e468b996d8ef83de29515743682e9457612e1b7a185b1dc6a902104ec
MD5 hash:
cbaf81dcd781156dea6cec56129f8093
SHA1 hash:
f0db765bd5e8a99e381416d11ad869daa3ba3a32
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Ins_NSIS_Buer_Nov_2020_1
Author:Arkbird_SOLG
Description:Detect NSIS installer used for Buer loader

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments