Concrete signature match: Trojan - Appears legitimate but performs malicious actions for 32-bit Windows platform, family Guloader
This is a concrete detection of Trojan:Win32/Guloader.SRSP, a malicious loader identified through machine learning behavioral analysis. Guloader is known for downloading and executing secondary malicious payloads, often leading to information theft, remote access, or further system compromise.
No detailed analysis available from definition files.
a2872a57bbad4ddbd5a46e2bd32d502b0f8e0682d89869b72613d5bd5f74b5800399c34993fa4537408a571820f9f1d8b56c0348007baf90c2c93cd88085ac7d572604c4c9fa2bd8b7ba646845d8f18fd6d0644a278390bb764079182a4b23b0Immediately isolate the affected system to prevent further spread. Perform a full system scan with an updated antivirus, remove all detected files, and check for any persistence mechanisms. Due to the nature of Guloader as a loader, consider professional incident response or system re-imaging to ensure complete eradication of any dropped payloads.