Severity
Medium
Analysis Summary
Since 2019, Guloader has been in operation as a downloader. GuLoader spreads through spam campaigns with malicious archived attachments. GuLoader downloads the bulk of malware, with the most frequent being AgentTesla, FormBook, and NanoCore. The encrypted payloads of this downloader are usually saved on Google Drive. It also acquired its payloads from Microsoft OneDrive and an attacker-controlled website.
GuLoader can avoid network-based detection by using genuine file-sharing websites, which aren't often filtered or inspected in corporate contexts. GuLoader malware spawns AgentTesla In its latest campaign in October 2022. AgentTesla is renowned for stealing data from a variety of target workstations' apps, including browsers, FTP clients, and file downloaders.
Guloader is often distributed as part of a wider malware campaign and is usually delivered in a packed or encrypted form to evade detection by security software. Once it has successfully installed itself on a system, it will attempt to establish persistence by modifying system settings, creating registry entries, and adding itself to startup items.
GuLoader has been actively deployed for over three years, and its developers continue to enhance its capabilities. The latest version incorporates advanced anti-analysis techniques, making it extremely challenging for security researchers to analyze and detect. The most recent GuLoader samples consistently receive zero detections on popular antivirus platforms like VirusTotal, ensuring the stealthy execution of its malicious payloads.
One notable feature of GuLoader is its fully encrypted payload, which includes the PE headers. This enables threat actors to store the payloads on well-known public cloud services, effectively evading traditional antivirus protections. By leveraging cloud storage, the malicious payloads can remain available for download over an extended period without raising suspicion.
While earlier versions of GuLoader were implemented as Visual Basic 6 (VB6) applications containing encrypted shellcode, the current variants predominantly utilize VBScript and NSIS installer-based techniques. The VBScript variant, in particular, stores the shellcode on a remote server, further complicating detection and analysis.
To protect against Guloader malware, it is important to have a strong antivirus solution in place and to keep all software up to date with the latest security patches. Additionally, users should be cautious when opening email attachments or clicking on links from unknown or suspicious sources.
Impact
- Malware Installation
- Detection Evasion
- Information Theft
Indicators of Compromise
MD5
d0ed0abcf3fa360c725e0dbce00f96de
24fe3a258044540e00eb8fbf252b29e5
d05a21133aa5d08220b385965bf678d2
35a2fc86374a57aef3455cf38295433c
c264e434f072fd7d7b4bd11689e7579e
SHA-256
11f392975699cfc7bae3ec4a5cae53d0a16f182038416728b24813d0e78cf3bc
fe5fc9dc66a30fe5f3506749f0aa6ee7326e92dd16d84dca665b896241b6b19a
2803a6af28d635b93ad31a5a9d129bc4a4e143700013b1d660041aa02ccfb799
f96b54b3cc761ae3cef2bc3455a2d31b0f14ef0165e874adfcf09e20098059ed
bac00be71feb7f3f3091eb54d53771e21eee2c422f148e8524bb09e1827e2b70
SHA1
ac45b48bb58fc7f7471c1e2bbd639727e1707e4d
a4000107c82a94b75f1fe695c9a151817125beeb
d29b72f0bb0c7606844426ce7b087b9ce5593b80
c5682b2acf92c056a30fa513b9eb6a9bac413d5f
c036904eb33bea542b242b301658e109e1542a5f
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Emails from unknown senders should always be treated with caution.
- Never trust or open links and attachments received from unknown sources/senders.
- Limit access to administrative accounts and portals to only relevant personnel and make sure they are not publicly accessible.
- Enforce access management policies.

