MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 02aaf083124e0064c6d00f7e1d5228e7cd401a3c0f96020124fd17dcd36f49bc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Emotet (aka Heodo)


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments

SHA256 hash: 02aaf083124e0064c6d00f7e1d5228e7cd401a3c0f96020124fd17dcd36f49bc
SHA3-384 hash: 22f4965d2abc9dbaed7829dc1b73dd3f6a2287e04673854b183028471f8b823d06c0a4046a9cee54c479be2b50f46249
SHA1 hash: 6dc15da4eb78426b9d97747b6d33a53b763ca50a
MD5 hash: d69df9a9602f03ae18525bac7651c1d8
humanhash: twenty-uniform-delaware-hawaii
File name:CS9MPM.dll
Download: download sample
Signature Heodo
File size:522'675 bytes
First seen:2022-06-08 17:14:53 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 17a9db8a367c83d15112ca6763718dff (6 x Heodo)
ssdeep 12288:9OT6sIypRSjjElCBQCRbpNdUzJwxDD2+UkoX8LlGf:9OT6zypRSfyHCRbyKVD2+UkoX8hGf
Threatray 228 similar samples on MalwareBazaar
TLSH T146B49E17A69194B7C086C330D5DBA731B331BCAD07239A2B5A61C7385EA67E04F6DB1C
TrID 56.8% (.EXE) InstallShield setup (43053/19/16)
17.2% (.SCR) Windows screen saver (13101/52/3)
13.8% (.EXE) Win64 Executable (generic) (10523/12/4)
3.9% (.MZP) WinArchiver Mountable compressed Archive (3000/1)
2.6% (.EXE) OS/2 Executable (generic) (2029/13)
Reporter pr0xylife
Tags:Emotet epoch5 exe Heodo

Intelligence


File Origin
# of uploads :
1
# of downloads :
301
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
report-2781679.xls
Verdict:
Malicious activity
Analysis date:
2022-06-08 17:16:53 UTC
Tags:
macros loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Creating a service
Launching a process
Sending a custom TCP request
Moving of the original file
Enabling autorun for a service
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
control.exe greyware overlay packed spyeye
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
88 / 100
Signature
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Multi AV Scanner detection for domain / URL
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected Emotet
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 641752 Sample: CS9MPM.dll Startdate: 08/06/2022 Architecture: WINDOWS Score: 88 47 103.224.241.74 WEBWERKS-AS-INWebWerksIndiaPvtLtdIN India 2->47 49 202.29.239.162 UNINET-AS-APUNINET-TH Thailand 2->49 51 37 other IPs or domains 2->51 65 Snort IDS alert for network traffic 2->65 67 Multi AV Scanner detection for domain / URL 2->67 69 Antivirus detection for URL or domain 2->69 71 2 other signatures 2->71 9 loaddll64.exe 1 2->9         started        11 cmd.exe 1 2->11         started        13 cmd.exe 1 2->13         started        15 13 other processes 2->15 signatures3 process4 dnsIp5 18 regsvr32.exe 5 9->18         started        21 cmd.exe 1 9->21         started        23 rundll32.exe 2 9->23         started        33 2 other processes 9->33 25 conhost.exe 11->25         started        27 wevtutil.exe 1 11->27         started        29 conhost.exe 13->29         started        31 wevtutil.exe 13->31         started        59 20.190.160.15, 443, 49887, 49888 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 15->59 61 192.168.2.1 unknown unknown 15->61 35 12 other processes 15->35 process6 signatures7 63 Hides that the sample has been downloaded from the Internet (zone.identifier) 18->63 37 regsvr32.exe 12 18->37         started        41 rundll32.exe 2 21->41         started        43 regsvr32.exe 23->43         started        process8 dnsIp9 53 104.244.79.94, 443, 49762 PONYNETUS United States 37->53 55 212.83.184.188, 49748, 8080 OnlineSASFR France 37->55 57 173.249.25.219, 443, 49759, 49760 CONTABODE Germany 37->57 73 System process connects to network (likely due to code injection or exploit) 37->73 75 Hides that the sample has been downloaded from the Internet (zone.identifier) 41->75 45 regsvr32.exe 41->45         started        signatures10 process11
Threat name:
Win64.Trojan.Emotet
Status:
Malicious
First seen:
2022-06-08 17:15:11 UTC
File Type:
PE+ (Dll)
AV detection:
20 of 26 (76.92%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:emotet botnet:epoch5 banker suricata trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: RenamesItself
Suspicious use of WriteProcessMemory
Emotet
suricata: ET MALWARE W32/Emotet CnC Beacon 3
Malware Config
C2 Extraction:
78.47.204.80:443
212.83.184.188:8080
36.67.23.59:443
128.199.217.206:443
103.56.149.105:8080
202.29.239.162:443
68.183.91.111:8080
104.244.79.94:443
64.227.55.231:8080
157.230.99.206:8080
165.232.185.110:8080
103.71.99.57:8080
103.126.216.86:443
88.217.172.165:8080
103.41.204.169:8080
87.106.97.83:7080
85.25.120.45:8080
188.225.32.231:4143
118.98.72.86:443
178.62.112.199:8080
210.57.209.142:8080
62.171.178.147:8080
37.44.244.177:8080
54.37.228.122:443
202.28.34.99:8080
103.254.12.236:7080
196.44.98.190:8080
59.148.253.194:443
85.214.67.203:8080
195.77.239.39:8080
173.249.25.219:443
103.85.95.4:8080
175.126.176.79:8080
157.245.111.0:8080
93.104.209.107:8080
139.196.72.155:8080
54.37.106.167:8080
165.22.254.236:8080
116.124.128.206:8080
103.224.241.74:8080
202.134.4.210:7080
104.248.225.227:8080
Unpacked files
SH256 hash:
3e9e67c43bdcb652c97c559ea5fd01adc7b946154013f9b50eef508dd87168d3
MD5 hash:
b13a6c30e2e3143e33df858f79931df6
SHA1 hash:
269a1fbe571b55573a19508b01e3f8feeaa61863
SH256 hash:
02aaf083124e0064c6d00f7e1d5228e7cd401a3c0f96020124fd17dcd36f49bc
MD5 hash:
d69df9a9602f03ae18525bac7651c1d8
SHA1 hash:
6dc15da4eb78426b9d97747b6d33a53b763ca50a
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments