

Quasar RAT aka CinaRAT – Active IOCs
March 10, 2025
Medusa Ransomware – Active IOCs
March 11, 2025
Quasar RAT aka CinaRAT – Active IOCs
March 10, 2025
Medusa Ransomware – Active IOCs
March 11, 2025Severity
Medium
Analysis Summary
Since 2019, Guloader has been in operation as a downloader. GuLoader spreads through spam campaigns with malicious archived attachments. GuLoader downloads the bulk of malware, with the most frequent being AgentTesla, FormBook, and NanoCore. The encrypted payloads of this downloader are usually saved on Google Drive. It also acquired its payloads from Microsoft OneDrive and an attacker-controlled website.
GuLoader can avoid network-based detection by using genuine file-sharing websites, which aren't often filtered or inspected in corporate contexts. GuLoader malware spawns AgentTesla In its latest campaign in October 2022. AgentTesla is renowned for stealing data from a variety of target workstations' apps, including browsers, FTP clients, and file downloaders.
Guloader is often distributed as part of a wider malware campaign and is usually delivered in a packed or encrypted form to evade detection by security software. Once it has successfully installed itself on a system, it will attempt to establish persistence by modifying system settings, creating registry entries, and adding itself to startup items.
GuLoader has been actively deployed for over three years, and its developers continue to enhance its capabilities. The latest version incorporates advanced anti-analysis techniques, making it extremely challenging for security researchers to analyze and detect. The most recent GuLoader samples consistently receive zero detections on popular antivirus platforms like VirusTotal, ensuring the stealthy execution of its malicious payloads.
One notable feature of GuLoader is its fully encrypted payload, which includes the PE headers. This enables threat actors to store the payloads on well-known public cloud services, effectively evading traditional antivirus protections. By leveraging cloud storage, the malicious payloads can remain available for download over an extended period without raising suspicion.
While earlier versions of GuLoader were implemented as Visual Basic 6 (VB6) applications containing encrypted shellcode, the current variants predominantly utilize VBScript and NSIS installer-based techniques. The VBScript variant, in particular, stores the shellcode on a remote server, further complicating detection and analysis.
To protect against Guloader malware, it is important to have a strong antivirus solution in place and to keep all software up to date with the latest security patches. Additionally, users should be cautious when opening email attachments or clicking on links from unknown or suspicious sources.
Impact
- Malware Installation
- Detection Evasion
- Information Theft
Indicators of Compromise
MD5
5068420bb254af36f27297856dddecd6
2ae9bcf198da97e18a6c4ae37ac5bad1
79834ec8b7caf729dcee43771f06af41
a28d4f58cb9c99ed8b7e504df64614cf
SHA-256
4ebb1b3153eaba6777b2f4c888fc136f99604b8f956076013168b4af12e55407
feea5edf101754a9aee746b32364b0ab6fd47dc26dd544c33ae2808194d910c6
e99de03dae4d4b5af5c02203256a1f0413cd9d2d8bb338ab3e8d038d191f62d6
05a1cf46292f57f27baad4e865599339a1476916f52237688c8b9e98eafc4459
SHA1
be2271b2acdc17d03aef9ed4f27f01bb602eea14
d8074c1d9adc4293414323d6506c7057611e1df9
0db130c050fb54beea649e61d689486b52739821
a8c043583f092ae735a1165f2fb1d1a9ba91f305
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Emails from unknown senders should always be treated with caution.
- Never trust or open links and attachments received from unknown sources/senders.
- Limit access to administrative accounts and portals to only relevant personnel and make sure they are not publicly accessible.
- Enforce access management policies.