Live Training | What's New in Lumu Defender

Already have an account? Sign in

Sign in

Malware

S0561

GuLoader

Type

Downloader

Associated threat actors

Various

Key Capabilities

Delivers a range of malicious payloads, such as ransomware or banking Trojans. Evades antivirus using encryption and steganography.

OS Targeted

Windows

IoCs on Maltiverse

Maltiverse provides updated IoCs for easy SIEM/SOAR/Firewall/EDR integration.

What is GuLoader?

GuLoader (S0561), sometimes known as CloudEyE, is a malware downloader designed to evade detection. These evasive techniques include downloading encrypted payloads and using steganography to hide malware within harmless files.

GuLoader is used to deliver a range of malicious payloads, such as banking trojans or ransomware, including NetWire, AgentTesla, NanoCore. It can also steal sensitive login credentials.

How to Defend Against GuLoader?

Defending against GuLoader requires preventing its initial delivery and detecting its advanced evasion techniques.

  • Be cautious with email attachments and links, as phishing is a primary delivery vector for this downloader.
  • Keep all operating systems and software patched to limit the vulnerabilities that can be exploited for initial access.
  • Deploy endpoint detection and antivirus to identify and block the execution of the loader and its evasive behaviors.
  • Use network detection (NDR) with integrated threat intelligence to spot and block C2 communications and payload downloads.

Join our pre-day 
workshop waitlist

By clicking “Submit Request” you agree to the Lumu Terms of Service and Privacy Policy.