MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f954f5ad26b3efdfe4607fa4b0ff25fb82f7284490b283e2fda53b911e88094e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 12


Intelligence 12 IOCs YARA 1 File information Comments

SHA256 hash: f954f5ad26b3efdfe4607fa4b0ff25fb82f7284490b283e2fda53b911e88094e
SHA3-384 hash: 76d8ecc039fa3cc4fea6b037e468e9adccbf307ec491e7cd428f10b43bb3b4e46f6b316c5274dabd4017ec5cc3ba4bf5
SHA1 hash: e57c72a01f70328cc024da9e0f74eafacc519a2c
MD5 hash: 013b655bb0b82981a226088a02950e06
humanhash: friend-solar-harry-cat
File name:Otto Technic 6665555655 için Satın Alma Siparişi.exe
Download: download sample
Signature GuLoader
File size:1'043'456 bytes
First seen:2022-08-24 12:27:29 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 332f7ce65ead0adfb3d35147033aabe9 (82 x XRed, 18 x SnakeKeylogger, 7 x DarkComet)
ssdeep 12288:2MSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9uPgdJNg+3KOUgTx:2nsJ39LyjbJkQFMhmC+6GD9ugdEOKVm
Threatray 70 similar samples on MalwareBazaar
TLSH T1D0259E22F2D18437D1721A3D9C6B93A4583ABE512E347A4F3BE52E4C5F7A38138652D3
TrID 92.9% (.EXE) Win32 Executable Borland Delphi 7 (664796/42/58)
1.9% (.EXE) Win32 Executable Delphi generic (14182/79/4)
1.4% (.EXE) Win64 Executable (generic) (10523/12/4)
1.3% (.EXE) DOS Borland compiled Executable (generic) (10000/1/2)
0.6% (.EXE) Win32 Executable (generic) (4505/5/1)
dhash icon 74f2c96874bc5c28 (1 x GuLoader)
Reporter 0xToxin
Tags:exe GuLoader

Intelligence


File Origin
# of uploads :
1
# of downloads :
315
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Otto Technic 6665555655 için Satın Alma Siparişi.exe
Verdict:
Malicious activity
Analysis date:
2022-08-24 12:30:39 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Creating a window
Searching for synchronization primitives
Creating a file
Enabling the 'hidden' option for recently created files
Creating a process from a recently created file
Creating a file in the %temp% directory
Creating a file in the Windows directory
Creating a file in the %AppData% subdirectories
Delayed reading of the file
Searching for the Windows task manager window
Launching a process
Creating a process with a hidden window
Sending a custom TCP request
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckCmdLine
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
cmd.exe evasive greyware hacktool keylogger macros macros-on-close macros-on-open shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
GuLoader
Detection:
malicious
Classification:
troj.expl
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Document contains an embedded VBA macro with suspicious strings
Document contains an embedded VBA with functions possibly related to ADO stream file operations
Document contains an embedded VBA with functions possibly related to HTTP operations
Document contains an embedded VBA with functions possibly related to WSH operations (process, registry, environment, or keystrokes)
Drops PE files to the document folder of the user
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Uses dynamic DNS services
Yara detected GuLoader
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 689484 Sample: Otto Technic 6665555655 i#U... Startdate: 24/08/2022 Architecture: WINDOWS Score: 100 67 Snort IDS alert for network traffic 2->67 69 Antivirus detection for URL or domain 2->69 71 Antivirus detection for dropped file 2->71 73 10 other signatures 2->73 8 Otto Technic 6665555655 i#U00e7in Sat#U0131n Alma Sipari#U015fi.exe 1 6 2->8         started        11 EXCEL.EXE 23 15 2->11         started        14 Synaptics.exe 2->14         started        process3 dnsIp4 51 ._cache_Otto Techn...a Sipari#U015fi.exe, PE32 8->51 dropped 53 C:\ProgramData\Synaptics\Synaptics.exe, PE32 8->53 dropped 55 C:\ProgramData\Synaptics\RCXD7D8.tmp, PE32 8->55 dropped 57 C:\...\Synaptics.exe:Zone.Identifier, ASCII 8->57 dropped 16 Synaptics.exe 199 8->16         started        21 ._cache_Otto Technic 6665555655 i#U00e7in Sat#U0131n Alma Sipari#U015fi.exe 6 57 8->21         started        65 192.168.2.1 unknown unknown 11->65 file5 process6 dnsIp7 59 docs.google.com 142.250.180.142, 443, 49710, 49711 GOOGLEUS United States 16->59 61 freedns.afraid.org 69.42.215.252, 49715, 80 AWKNET-LLCUS United States 16->61 63 xred.mooo.com 16->63 47 C:\Users\user\Documents\~$cache1, PE32 16->47 dropped 75 Antivirus detection for dropped file 16->75 77 Drops PE files to the document folder of the user 16->77 79 Machine Learning detection for dropped file 16->79 23 WerFault.exe 16->23         started        49 C:\Users\user\AppData\Local\...\nsExec.dll, PE32 21->49 dropped 25 powershell.exe 21->25         started        27 powershell.exe 21->27         started        29 powershell.exe 21->29         started        31 19 other processes 21->31 file8 signatures9 process10 process11 33 conhost.exe 25->33         started        35 conhost.exe 27->35         started        37 conhost.exe 29->37         started        39 conhost.exe 31->39         started        41 conhost.exe 31->41         started        43 conhost.exe 31->43         started        45 16 other processes 31->45
Threat name:
Win32.Backdoor.DarkComet
Status:
Malicious
First seen:
2022-08-24 12:28:09 UTC
File Type:
PE (Exe)
Extracted files:
80
AV detection:
25 of 26 (96.15%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
discovery persistence
Behaviour
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Windows directory
Adds Run key to start application
Checks installed software on the system
Checks computer location settings
Loads dropped DLL
Executes dropped EXE
Unpacked files
SH256 hash:
b7823a15e7b1866ba3d77248f750b66505859d264cfc39d8c8c5e812f8ae4a81
MD5 hash:
a1da6788aeaf78ca4ae1dece8019e49d
SHA1 hash:
d770155e6e9aa69223be198c44a8da26a1756d89
SH256 hash:
f19f36b3d8c9f78786eb2dc99d7c7ffbfa1c8236843f139c625a60fde3e6b4c3
MD5 hash:
59e487d0a38dce3f6be70d153d7b84a0
SHA1 hash:
0c2ca2fb13731c9f5c53d663dd3804a423736c45
SH256 hash:
a099f6609f569597ec71fbad366db8fde2f54c13632ec1b8bee0ae60edfa0541
MD5 hash:
c214619a8f9414b572fe2b022f655260
SHA1 hash:
964d57c57a79024e8b11625317bfa1be8ade1e3a
SH256 hash:
15e2035200e2f10e9085f39c59409834e1a1bf789a8aed17b17f428f126a941a
MD5 hash:
91a656f184e6d3b5501a5e3e2695f6f5
SHA1 hash:
b0bbb92fde658a065aae8f30c6a7b56685433472
SH256 hash:
f954f5ad26b3efdfe4607fa4b0ff25fb82f7284490b283e2fda53b911e88094e
MD5 hash:
013b655bb0b82981a226088a02950e06
SHA1 hash:
e57c72a01f70328cc024da9e0f74eafacc519a2c
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:vbaproject_bin
Author:CD_R0M_
Description:{76 62 61 50 72 6f 6a 65 63 74 2e 62 69 6e} is hex for vbaproject.bin. Macros are often used by threat actors. Work in progress - Ran out of time

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

GuLoader

Executable exe f954f5ad26b3efdfe4607fa4b0ff25fb82f7284490b283e2fda53b911e88094e

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments