MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 fbaaf4a20caaded35148803f10962ddbb81270216842b817d0a961e5be13c405. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
GuLoader
Vendor detections: 3
| SHA256 hash: | fbaaf4a20caaded35148803f10962ddbb81270216842b817d0a961e5be13c405 |
|---|---|
| SHA3-384 hash: | a9ec338446aac8cfffa40460a8c5a9b91e135b3e6540196780620d4b558232ff47138e63b4c87e3b108c5461f20d1d54 |
| SHA1 hash: | ce15a5e751046552e5f00cf34a2f0ea42e55a241 |
| MD5 hash: | bab3d1881995072e584cab33fe5fcd3f |
| humanhash: | paris-summer-low-monkey |
| File name: | VP-XPE-S007-LT-002_SPARE PART LIST.exe |
| Download: | download sample |
| Signature | GuLoader |
| File size: | 122'880 bytes |
| First seen: | 2020-05-26 09:16:41 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 1d0ea4ac93484bff8a7ef2a545bdbe8f (1 x GuLoader) |
| ssdeep | 1536:kP0xTU5fJpqQmJ4WdT5sf74FH4y8fLDyu0IVJWUTXE65n8SkDzb0:kP0ZUlPLmJ4A474FPkJd5ODzw |
| Threatray | 154 similar samples on MalwareBazaar |
| TLSH | D5C31823B0D85D91E91C1EB24C6755E79A23ED22BA901F1B770AF71C25361C739F832A |
| Reporter | |
| Tags: | exe GuLoader |
abuse_ch
Malspam distributing GuLoader:HELO: mail-smail-vm86.hanmail.net
Sending IP: 211.231.106.161
From: 이태수 대리 <thlvkfl68@hanmail.net>
Subject: FW: [XPLE PJ] Project RFQ/ Spare parts list [예산견적]
Attachment: VP-XPE-S007-LT-002_SPARE PART LIST.IMG (contains "VP-XPE-S007-LT-002_SPARE PART LIST.exe")
GuLoader payload URL:
https://drive.google.com/uc?export=download&id=1FaIrcjvh13I-GykLsBIbuVk9NXRIJfyH
Intelligence
File Origin
# of uploads :
1
# of downloads :
72
Origin country :
n/a
Vendor Threat Intelligence
Detection:
n/a
Gathering data
Threat name:
Win32.Trojan.Injector
Status:
Malicious
First seen:
2020-05-26 09:37:28 UTC
File Type:
PE (Exe)
Extracted files:
6
AV detection:
25 of 30 (83.33%)
Threat level:
5/5
Verdict:
malicious
Label(s):
guloader
Similar samples:
+ 144 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
5/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of NtSetInformationThreadHideFromDebugger
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.