MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ff1ec030f3f335af02cee82946ea04380dd4b5dd56f9d9494b201790710d051f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: ff1ec030f3f335af02cee82946ea04380dd4b5dd56f9d9494b201790710d051f
SHA3-384 hash: 1a4e376e108a86d21e22796fb9b12db492231d3b5593fd410da70ada95c3a06e2d1ded771fd150c00f59150a62e6c26a
SHA1 hash: 12549952d0dc074f68fafbba0f1a578d54ed9c10
MD5 hash: c129da99b0bff11d9fc4617b9e072d74
humanhash: minnesota-nitrogen-missouri-mike
File name:Order#33925_pdf.exe
Download: download sample
Signature GuLoader
File size:110'592 bytes
First seen:2020-05-26 07:39:39 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash e0dcc55003fdee4a0b9d4ab255c844ad (1 x GuLoader)
ssdeep 1536:vP8Ob/u9JgR+wosDdEffb9ad+qqyNLphNlCmwCUkqYmlyP8TZ:vUO69qRFosDd6Bad+Kp0mwCUkqYw
Threatray 110 similar samples on MalwareBazaar
TLSH 57B3D7027AE4FCA2EC015EF11FD1AEA60E66BD342C618F03B45B778D253A1E51FA1719
Reporter abuse_ch
Tags:exe GuLoader


Avatar
abuse_ch
Malspam distributing GuLoader:

HELO: mail-m24148.qiye.163.com
Sending IP: 220.194.24.148
From: Purchase department <hlsong@deburringchina.com>
Subject: New order-(Top Urgent.)
Attachment: Order33925_pdf.zip (contains "Order#33925_pdf.exe")

GuLoader payload URLs:
http://keno-eneryg.com/mmddy/OriginBinyikoto_FJGLobKtZ240.bin
http://legalpros.lawyer/mmdy/OriginBinyikoto_FJGLobKtZ240.bin

Intelligence


File Origin
# of uploads :
1
# of downloads :
68
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Injector
Status:
Malicious
First seen:
2020-05-26 08:52:48 UTC
File Type:
PE (Exe)
Extracted files:
6
AV detection:
20 of 31 (64.52%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
persistence
Behaviour
Suspicious behavior: MapViewOfSection
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Adds Run key to start application
Checks QEMU agent state file
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

GuLoader

Executable exe ff1ec030f3f335af02cee82946ea04380dd4b5dd56f9d9494b201790710d051f

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments