BLACK FRIDAY: 2-for-1 offer NOVEMBER 20 - 26 See details

GuLoader

32
Global rank
11 infographic chevron month
Month rank
30 infographic chevron week
Week rank
1002
IOCs

GuLoader is an advanced downloader written in shellcode. It’s used by criminals to distribute other malware, notably trojans, on a large scale. It’s infamous for using anti-detection and anti-analysis capabilities.

Downloader
Type
Italy
Origin
1 December, 2019
First seen
1 May, 2024
Last seen
Also known as
CloudEyE
vbdropper

How to analyze GuLoader with ANY.RUN

Downloader
Type
Italy
Origin
1 December, 2019
First seen
1 May, 2024
Last seen

IOCs

Hashes
fc423870796dff42517d1695ac87a45b54e52f18a76184ea31f64ec778f80348
8b4445c88d5f03929eca415260f5bc0961d3053a440b013df2c68a0f8ac13600
bba7b7e91056db7fb6f628ab6478960b96c1a9d8606d6d5b4d74d5043b2bad79
20e13716e48ab9be1a201a88710b02e278d334115682015034b0b600bfb460af
6c5f4af43bb0a05b40f995ea3993911b433317369d8e9733b7d3dcac76b14b04
45923109350d3e2ccd5366be4133c2e8a7e300abb9b19fdc85695497f4c57347
3804066d2173f6a47f45ea96048325acd8bec209fe620a177f70dee06ccf9c61
ce3b989b469492de7c84e8b7c53e25cb29143795add4fb7b6f606e84d56a4f71
7bbec697f119cfe105a602196217959e123f529f03b50650bed1787d965457f0
c6377809c3346c3ce56d9ce05cff41d0385e85d6fd207085221f5747254da92a
fbe01e695b2a6b560da2025bc32a0269b9a4b97417ae6982e99c35cd14352ff9
575f52515dfb63af7795607131d7e060665f0f57b290e83431a42d178b9e4471
82dc4f7c2ea68af3f87091f524aaf5065de9a37a7f44df23529f13db6f3ba3bb
48a1dff5c04921f16e830493a6b3f9ca3478d0511278d1e4c3c6b61234ca6fde
0dde47d0905eb44af2fe7b3604c88ceb170b977312730dabd17a96de610a33b6
66cc71755aa3e92cb3a2bf2ed73a37588225d904db0dbbc9a2da56b30e147896
82c928bd012d1188bc38674fa48134723ff61a198a47a69b47e00c51efdaee0a
4007bbfbca22c422fe6a0d46a5c8588fb30342b44b7cd306b143a2ef599c7d4d
78df1676000a461cdda4e1493b26619e3a934d183fee71987a2175c590cf69b4
6ca208edbc718f737f74ee0a631ed22cd2bf67a0db679d9d1702575c087550cc
Domains
mail.elkat.com.my
elkat.com.my
URLs
https://drive.google.com/uc?export=download&id=1KZW4DcWH6w4uA6ckxVxeWOUldlIS57gL
https://drive.google.com/uc?export=download&id=1Qv3u9CXWt26hYqraGYIPRpEn-gzPX1Qk
https://absorbante-calitate.ro/calitateX/NLonIQWPMHAhOKeszHpRTm43.binUdsosNonabsorbante-calitate.ro/calitateX/NLonIQWPMHAhOKeszHpRTm43.bin
https://kraljevikonaci.rs/OAOxio170.bin
http://146.70.113.163/IqCzipqoQBwPWC138.bin
https://drive.google.com/uc?export=download&id=13d3vSnnnSqPQHvAKGjzAcgNiA-IC-wI7
http://185.216.71.95/IeASVIeBWNJsURLHgcFIkLgNqqN89.lpk
https://drive.google.com/uc?export=download&id=1e2pCdayv7gUh9j3q7Z7o8eFMC3sNvcKX
https://adamkiddoo.com/ASsHdVpRUDfpWtkNHm150.bin
http://trailers24.eu/GH.bin
http://94.156.8.104/nMSiM192.bin
https://drive.google.com/uc?export=download&id=1TIapeReTSknJPu_jP1N-sPeyAm6F9JEM
http://goldendesign.hu/TU.bin
http://chashni.co/jjTrpCQFr22.binKantLouhaps.co.mz/jjTrpCQFr22.bin
https://drive.google.com/uc?export=download&id=1WRHYuNBKht0Hk98dnxkECcBirrvoNbtp
http://103.131.130.54/NOBQBfVQnXy200.bin
https://drive.google.com/uc?export=download&id=1yXbm0ZniOgOmYtG7xcI-CLRi5GdvxbRk
https://drive.google.com/uc?export=download&id=1f2m_J8fNcvsRHkkYQsQ4XAQWa0PFKtnM
https://drive.google.com/uc?export=download&id=1WRTnANLAe8ruFTYqPFwspJCOKPbmIpRf
http://renzoll.com/nQTblFMXetDmiBnXTeQX27.bin
Last Seen at

Recent blog posts

post image
New Redline Version: Uses Lua Bytecode, Propa...
watchers 713
comments 0
post image
Find Malware by File Contents with YARA Searc...
watchers 1347
comments 0
post image
Cybercriminals Exploit Google Ads to Spread I...
watchers 655
comments 0

What is GuLoader malware

Just like the name suggests, GuLoader (sometimes also called CloudEyE and vbdropper) is a first-stage trojan designed to infect a system and drop a final payload. Typically other trojans or RATs. Once the malware makes its way into the victim's system, it attempts to establish a remote connection and download a malicious executable.

This malware is infamous for using advanced anti-detection and obfuscation techniques. It evades network detection, stops executing in virtual environments, and can slip past automatics security systems.

Researchers first observed GuLoader in December 2019, when it was used in a campaign delivering Remcos RAT. Throughout 2020, the trojan kept gaining popularity, at one point accounting for 25% of all packeted samples recorded by Check Point Research. Today, GuLoader remains a highly active threat. It often delivers NanoCore, Agent Tesla, LokiBot, and FormBook.

General description of GuLoader downloader

GuLoader is written in encrypted shellcode wrapped in a Visual Basic 6 (VB6) executable. Notably, it stores second-stage payloads in cloud drive services. Usually, in Google Drive or Microsoft OneDrive. This way, it can establish a connection and download the executable without raising any red flags. The payload is usually encrypted, allowing it to slip past the cloud host’s security measures.

This loader is infamous for its use of anti-analysis techniques:

  1. The shellcode is heavily obfuscated and mixed with generous amounts of junk code.
  2. It detects sandboxes with EnumWindows by counting the number of application windows on the screen and terminates with an error message.
  3. It tampers with debugging software, causing crashes.
  4. It uses process hollowing to inject malicious code into a benign process and evade detection by an antivirus.
  5. To confuse analysts, its PE header contains only generic GetProcAddress instructions.

Like many downloaders, GuLoader is offered as a service. Prices start at $100 per month. It is distributed in the clearnet by a company with a domain name in the .eu zone. The website markets it under the name CloudEye, claiming that this is a security tool intended for protecting applications against cracking. However, the same site contains links to YouTube tutorials that clearly display how to use the software maliciously. They also show how to abuse cloud drives.

Researchers managed to link GuLoader to an Italian-based hacking group by analyzing emails left as contact details in old forum threads. One of the users behind the loader is known under the alias sonykuccio. He advertised a malware variant as far back as 2011 and offered paid services, claiming that he could make other malicious programs harder to detect. That is why GuLoader uses so many intricate anti-evasion techniques.

How to get more information from GuLoader malware

ANY.RUN helps researchers perform malware analysis of GuLoader and track its execution process in an interactive sandbox.

GuLoader text report

Figure 1: GuLoader text report generated by ANY.RUN

ANY.RUN allows users to save time during analysis and present crucial information extracted from malware immediately. Analysts may take a look inside GuLoader malware configuration 10 second after its process started.

GuLoader malware configuration

Figure 2: GuLoader malware configuration

GuLoader execution process

The form of GuLoader's distribution changing over time, but its execution flow always stay pretty straightforward. Since the purpose of GuLoader is to download to the infected system main payload, after its start it check is it run inside virtual environment. When check passed, it starts connection and download payload. Once payload downloaded and starts execution, GuLoader stops.

But even if loader didn't connect to C2 during analysis, you always may look in extracted malware configuration to find out from where GuLoader is wants to receive payload!

Read a detailed analysis of GuLoader in our blog.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

Distribution of GuLoader

The distribution method of GuLoader is very typical. The loader is usually delivered as an Office document attachment in spam email campaigns. When downloaded, it uses a macro to install the malicious program. Sometimes it is also delivered as an executable in a .rar archive.

During the pandemic, many campaigns exploited the fear surrounding Covid-19 by mentioning the virus. More recently, attackers have been using fake payment invoices. They will impersonate a bank and use social engineering to trick the victim into downloading an infected file to check “payment details.”

Conclusion

GuLoader is available as a service for a relatively low price, can be easily found in the clearnet, and comes with easy-to-follow instructions. No wonder, then, that creators claim they already have over 5000 clients. Thanks to the combination of advanced anti-evasion tricks and ease of use, we expect its popularity to continue to grow.

Thankfully, GuLoader is easily detectable in ANY.RUN sandbox. It only takes a few minutes to launch an interactive emulation and identify the threat.

HAVE A LOOK AT

Adwind screenshot
Adwind
adwind trojan
Adwind RAT, sometimes also called Unrecom, Sockrat, Frutas, jRat, and JSocket, is a Malware As A Service Remote Access Trojan that attackers can use to collect information from infected machines. It was one of the most popular RATs in the market in 2015.
Read More
Agent Tesla screenshot
Agent Tesla
agenttesla trojan rat stealer
Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.
Read More
Amadey screenshot
Amadey
amadey
Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks.
Read More
Arkei screenshot
Arkei
arkei stealer
Arkei is a stealer type malware capable of collecting passwords, autosaved forms, cryptocurrency wallet credentials, and files.
Read More
AsyncRAT screenshot
AsyncRAT
asyncrat
AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.
Read More
WarZone screenshot
WarZone
warzone avemaria stealer trojan rat
WarZone RAT is a remote access trojan, which is written in C++ and offered as a malware-as-a-service. It packs a wide range of capabilities, from stealing victims’ files and passwords to capturing desktop activities. WarZone RAT is primarily distributed via phishing emails and receives regular updates from its C2.
Read More

Our website uses cookies. By visiting the pages of the site, you agree to our Privacy Policy