Guloader Malware Being Disguised as Employee Performance Reports
AhnLab SEcurity intelligence Center (ASEC) recently discovered the Guloader malware being distributed via phishing emails disguised as an employee performance report. The email claims to be informing the recipient about the report for October 2025, and prompts the recipient to check the attachment by mentioning the plan to dismiss some employees.

Figure 1. Phishing email body
The attached file is a compressed file in RAR format, and it contains an NSIS executable file named “staff record pdf.exe” inside. If the extension is not displayed, there is a risk of being mistaken for a PDF document and being executed, so please be cautious.

Figure 2. Inside the attached compressed file
The staff record pdf.exe file is Guloader malware. When executed, it loads and executes the shellcode located in the C2 below into memory.
- URL : hxxps://drive.google[.]com/uc?export=download&id=1bzvByYrIHy24oMCIX7Cv41gP9ZY3pRsgv

Figure 3. Shellcode being downloaded
The final malware that is executed is Remcos RAT. It allows threat actors to perform malicious remote control behaviors such as keylogging, capturing screenshots, controlling webcams and microphones, as well as extracting browser histories and passwords from the installed system.
- Remcos RAT C2 : 196.251.116[.]219:2404,5000

Figure 4. C2 information of Remcos RAT
Users must be extra cautious when opening emails from unknown sources. Regular password changes are necessary to prevent secondary damage. Additionally, unlike cases where threat actors use their own address or breached addresses to leak information, the number of cases where normal platforms are used as C2 is continuously increasing, so users must be extra cautious.