BLACK FRIDAY: 2-for-1 offer NOVEMBER 20 - 26 See details

GuLoader

32
Global rank
15 infographic chevron month
Month rank
7 infographic chevron week
Week rank
1030
IOCs

GuLoader is an advanced downloader written in shellcode. It’s used by criminals to distribute other malware, notably trojans, on a large scale. It’s infamous for using anti-detection and anti-analysis capabilities.

Downloader
Type
Italy
Origin
1 December, 2019
First seen
16 May, 2024
Last seen
Also known as
CloudEyE
vbdropper

How to analyze GuLoader with ANY.RUN

Downloader
Type
Italy
Origin
1 December, 2019
First seen
16 May, 2024
Last seen

IOCs

Hashes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mail.elkat.com.my
elkat.com.my
URLs
https://drive.google.com/uc?export=download&id=1OKDYnwO3s85sfWYBNeY-WHt4-RE2cpcB
https://drive.google.com/uc?export=download&id=1Iw1ePJDtXKYT9bCoHB-Nhsm1Sv3binXY
http://107.174.20.217/ZkKIyzTq148.bin
http://www.qeintechnologies.com/NmBkxeAZlIrfpt226.bin
https://drive.google.com/uc?export=download&id=1K1J55fzGPS9sFQkWm6matRahm3iHYHIN
https://drive.google.com/uc?export=download&id=1uC4q2HrJPc3j_cqewudIt3r3VrCAt60I
https://drive.google.com/uc?export=download&id=1I0LJGKW-kjo-DJHUKoec3dzUFjQKMjxx
https://drive.google.com/uc?export=download&id=1oVtTntL4nWtTzvC7d0R6SFbvzA88x3uB
http://38.15.131.216/TmvfDWknNOPvN247.bin
https://cdn.discordapp.com/attachments/1232238430654562385/1235388447477469256/DIBYlIUb233.bin
https://drive.google.com/uc?export=download&id=1gz78tnMzp-24jg1V-TmEdKjE5v5WEKRO
https://drive.google.com/uc?export=download&id=1AYHmt2bs57Yr79xy1imPloOi3aBM9rnl
https://drive.google.com/uc?export=download&id=17C4aNHk1vaNtz3uvSqoLKHrOyUOKUcrj
https://enelltd.top/DeppEphDHQSU128.bin
https://drive.google.com/uc?export=download&id=1v6fIJe2XCXG68SP1dD2S4iZtwvugup4r
https://drive.google.com/uc?export=download&id=10ah77p9Az_u9gn9ofU8M8QrabOnUbj1J
https://drive.google.com/uc?export=download&id=1KZW4DcWH6w4uA6ckxVxeWOUldlIS57gL
https://drive.google.com/uc?export=download&id=1CX2yBqz7XbywWVFEbXG245f7OZRK02Es
https://enelltd.top/HCnGUebqar210.bin
https://maggiorallic.com/merch/XmbyGSxBGFu241.binPreuScelegendvisionuae.com/stream/XmbyGSxBGFu241.binErepInhmig-pal.com/stream/XmbyGSxBGFu241.bin
Last Seen at

Recent blog posts

post image
Celebrate ANY.RUN’s 8th Birthday with Special...
watchers 76
comments 0
post image
How to Use Threat Intelligence Feeds
watchers 472
comments 0
post image
Tools and Technologies ANY.RUN Uses to Protec...
watchers 367
comments 0

What is GuLoader malware

Just like the name suggests, GuLoader (sometimes also called CloudEyE and vbdropper) is a first-stage trojan designed to infect a system and drop a final payload. Typically other trojans or RATs. Once the malware makes its way into the victim's system, it attempts to establish a remote connection and download a malicious executable.

This malware is infamous for using advanced anti-detection and obfuscation techniques. It evades network detection, stops executing in virtual environments, and can slip past automatics security systems.

Researchers first observed GuLoader in December 2019, when it was used in a campaign delivering Remcos RAT. Throughout 2020, the trojan kept gaining popularity, at one point accounting for 25% of all packeted samples recorded by Check Point Research. Today, GuLoader remains a highly active threat. It often delivers NanoCore, Agent Tesla, LokiBot, and FormBook.

General description of GuLoader downloader

GuLoader is written in encrypted shellcode wrapped in a Visual Basic 6 (VB6) executable. Notably, it stores second-stage payloads in cloud drive services. Usually, in Google Drive or Microsoft OneDrive. This way, it can establish a connection and download the executable without raising any red flags. The payload is usually encrypted, allowing it to slip past the cloud host’s security measures.

This loader is infamous for its use of anti-analysis techniques:

  1. The shellcode is heavily obfuscated and mixed with generous amounts of junk code.
  2. It detects sandboxes with EnumWindows by counting the number of application windows on the screen and terminates with an error message.
  3. It tampers with debugging software, causing crashes.
  4. It uses process hollowing to inject malicious code into a benign process and evade detection by an antivirus.
  5. To confuse analysts, its PE header contains only generic GetProcAddress instructions.

Like many downloaders, GuLoader is offered as a service. Prices start at $100 per month. It is distributed in the clearnet by a company with a domain name in the .eu zone. The website markets it under the name CloudEye, claiming that this is a security tool intended for protecting applications against cracking. However, the same site contains links to YouTube tutorials that clearly display how to use the software maliciously. They also show how to abuse cloud drives.

Researchers managed to link GuLoader to an Italian-based hacking group by analyzing emails left as contact details in old forum threads. One of the users behind the loader is known under the alias sonykuccio. He advertised a malware variant as far back as 2011 and offered paid services, claiming that he could make other malicious programs harder to detect. That is why GuLoader uses so many intricate anti-evasion techniques.

How to get more information from GuLoader malware

ANY.RUN helps researchers perform malware analysis of GuLoader and track its execution process in an interactive sandbox.

GuLoader text report

Figure 1: GuLoader text report generated by ANY.RUN

ANY.RUN allows users to save time during analysis and present crucial information extracted from malware immediately. Analysts may take a look inside GuLoader malware configuration 10 second after its process started.

GuLoader malware configuration

Figure 2: GuLoader malware configuration

GuLoader execution process

The form of GuLoader's distribution changing over time, but its execution flow always stay pretty straightforward. Since the purpose of GuLoader is to download to the infected system main payload, after its start it check is it run inside virtual environment. When check passed, it starts connection and download payload. Once payload downloaded and starts execution, GuLoader stops.

But even if loader didn't connect to C2 during analysis, you always may look in extracted malware configuration to find out from where GuLoader is wants to receive payload!

Read a detailed analysis of GuLoader in our blog.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

Distribution of GuLoader

The distribution method of GuLoader is very typical. The loader is usually delivered as an Office document attachment in spam email campaigns. When downloaded, it uses a macro to install the malicious program. Sometimes it is also delivered as an executable in a .rar archive.

During the pandemic, many campaigns exploited the fear surrounding Covid-19 by mentioning the virus. More recently, attackers have been using fake payment invoices. They will impersonate a bank and use social engineering to trick the victim into downloading an infected file to check “payment details.”

Conclusion

GuLoader is available as a service for a relatively low price, can be easily found in the clearnet, and comes with easy-to-follow instructions. No wonder, then, that creators claim they already have over 5000 clients. Thanks to the combination of advanced anti-evasion tricks and ease of use, we expect its popularity to continue to grow.

Thankfully, GuLoader is easily detectable in ANY.RUN sandbox. It only takes a few minutes to launch an interactive emulation and identify the threat.

HAVE A LOOK AT

Adwind screenshot
Adwind
adwind trojan
Adwind RAT, sometimes also called Unrecom, Sockrat, Frutas, jRat, and JSocket, is a Malware As A Service Remote Access Trojan that attackers can use to collect information from infected machines. It was one of the most popular RATs in the market in 2015.
Read More
Agent Tesla screenshot
Agent Tesla
agenttesla trojan rat stealer
Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.
Read More
Amadey screenshot
Amadey
amadey
Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks.
Read More
Arkei screenshot
Arkei
arkei stealer
Arkei is a stealer type malware capable of collecting passwords, autosaved forms, cryptocurrency wallet credentials, and files.
Read More
AsyncRAT screenshot
AsyncRAT
asyncrat
AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.
Read More
WarZone screenshot
WarZone
warzone avemaria stealer trojan rat
WarZone RAT is a remote access trojan, which is written in C++ and offered as a malware-as-a-service. It packs a wide range of capabilities, from stealing victims’ files and passwords to capturing desktop activities. WarZone RAT is primarily distributed via phishing emails and receives regular updates from its C2.
Read More

Our website uses cookies. By visiting the pages of the site, you agree to our Privacy Policy