

Windows 11 Lets Users Bypass the Microsoft Account Requirement
April 3, 2025
MassLogger Malware – Active IOCs
April 4, 2025
Windows 11 Lets Users Bypass the Microsoft Account Requirement
April 3, 2025
MassLogger Malware – Active IOCs
April 4, 2025Severity
Medium
Analysis Summary
Since 2019, Guloader has been in operation as a downloader. GuLoader spreads through spam campaigns with malicious archived attachments. GuLoader downloads the bulk of malware, with the most frequent being AgentTesla, FormBook, and NanoCore. The encrypted payloads of this downloader are usually saved on Google Drive. It also acquired its payloads from Microsoft OneDrive and an attacker-controlled website.
GuLoader can avoid network-based detection by using genuine file-sharing websites, which aren't often filtered or inspected in corporate contexts. GuLoader malware spawns AgentTesla In its latest campaign in October 2022. AgentTesla is renowned for stealing data from a variety of target workstations' apps, including browsers, FTP clients, and file downloaders.
Guloader is often distributed as part of a wider malware campaign and is usually delivered in a packed or encrypted form to evade detection by security software. Once it has successfully installed itself on a system, it will attempt to establish persistence by modifying system settings, creating registry entries, and adding itself to startup items.
GuLoader has been actively deployed for over three years, and its developers continue to enhance its capabilities. The latest version incorporates advanced anti-analysis techniques, making it extremely challenging for security researchers to analyze and detect. The most recent GuLoader samples consistently receive zero detections on popular antivirus platforms like VirusTotal, ensuring the stealthy execution of its malicious payloads.
One notable feature of GuLoader is its fully encrypted payload, which includes the PE headers. This enables threat actors to store the payloads on well-known public cloud services, effectively evading traditional antivirus protections. By leveraging cloud storage, the malicious payloads can remain available for download over an extended period without raising suspicion.
While earlier versions of GuLoader were implemented as Visual Basic 6 (VB6) applications containing encrypted shellcode, the current variants predominantly utilize VBScript and NSIS installer-based techniques. The VBScript variant, in particular, stores the shellcode on a remote server, further complicating detection and analysis.
To protect against Guloader malware, it is important to have a strong antivirus solution in place and to keep all software up to date with the latest security patches. Additionally, users should be cautious when opening email attachments or clicking on links from unknown or suspicious sources.
Impact
- Malware Installation
- Detection Evasion
- Information Theft
Indicators of Compromise
MD5
328f12f697bd0b3532b5c858e927e047
4e8582822cccd3d5bd32cb1ca663720c
f7ff125bd4422aaedc08183275b89993
2a14fc9835ff1851fa6c4ef3f902684a
SHA-256
2a2319d5721b91cf0e675d8c188dc11a85ac46dee327c72154c32d39296cbbde
3a92ee26699f555ad43f01359c674c73d849ef17560a928ef6abd75130b58712
65b4dc0633acbefc5b6f28022377455b476d7c1d1dd838d4c12bf5a12808c568
d85a67062725b37f0a0536f308d0102cfaab0e98cff757c9e7b1ebc602336fb7
SHA1
bbe9accbef7909c9fced0b4f09d96464247645aa
42ab02ef1d45854273f764a41170ae8d4196010d
4a335f295a757e9c71e77cf5d5589f5c30adba3d
6baa1d4657082d6443b118328e1506f6d20efdaf
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Emails from unknown senders should always be treated with caution.
- Never trust or open links and attachments received from unknown sources/senders.
- Limit access to administrative accounts and portals to only relevant personnel and make sure they are not publicly accessible.
- Enforce access management policies.