user@threatcheck.sh ~ threat-analysis
bash
$ analyze-threat Trojan:Win32/Guloader.SRSP!MTB
Trojan:Win32/Guloader.SRSP!MTB - Windows Defender threat signature analysis

Trojan:Win32/Guloader.SRSP!MTB - Windows Defender Threat Analysis

$ cat analysis.txt
=== THREAT ANALYSIS REPORT ===
Threat Name: Trojan:Win32/Guloader.SRSP!MTB
Classification:
Type:Trojan
Platform:Win32
Family:Guloader
Detection Type:Concrete
Known malware family with identified signatures
Variant:SRSP
Specific signature variant within the malware family
Suffix:!MTB
Detected via machine learning and behavioral analysis
Detection Method:Behavioral
Confidence:Very High
False-Positive Risk:Low

Concrete signature match: Trojan - Appears legitimate but performs malicious actions for 32-bit Windows platform, family Guloader

Summary:

This is a concrete detection of Trojan:Win32/Guloader.SRSP, a malicious loader identified through machine learning behavioral analysis. Guloader is known for downloading and executing secondary malicious payloads, often leading to information theft, remote access, or further system compromise.

Severity:
High
VDM Static Detection:
No detailed analysis available from definition files.
Known malware which is associated with this threat:
Filename: ARRIVAL-NOTICE-pdf.exe
a2872a57bbad4ddbd5a46e2bd32d502b0f8e0682d89869b72613d5bd5f74b580
08/01/2026
Filename: Shipping Documents.exe
0399c34993fa4537408a571820f9f1d8b56c0348007baf90c2c93cd88085ac7d
18/12/2025
Filename: MT. Sinar Mataram_pdf.exe
572604c4c9fa2bd8b7ba646845d8f18fd6d0644a278390bb764079182a4b23b0
18/12/2025
Remediation Steps:
Immediately isolate the affected system to prevent further spread. Perform a full system scan with an updated antivirus, remove all detected files, and check for any persistence mechanisms. Due to the nature of Guloader as a loader, consider professional incident response or system re-imaging to ensure complete eradication of any dropped payloads.
=== END REPORT ===
$ reanalyze-threat
This analysis was last updated on 18/12/2025. Do you want to analyze it again?
$ ls available-commands/
user@threatcheck.sh:~$