MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0b8ad413449454dd85f7a79c7600387658fb0e3e5b1b5ad8ab7119175551f819. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Emotet (aka Heodo)


Vendor detections: 9


Intelligence 9 IOCs YARA 1 File information Comments

SHA256 hash: 0b8ad413449454dd85f7a79c7600387658fb0e3e5b1b5ad8ab7119175551f819
SHA3-384 hash: 1926fad48aa2dd377aea44786c531f55132f293cd8ba5b62a9adca9c1a46e9302ffcea3b06a3c08ef1375ec68c3f1807
SHA1 hash: fb2d70b0d34d7311d9eb1b5c1f7d2ae5f07c8623
MD5 hash: b45fb6743a8f14da3b637d7ea1fd119c
humanhash: carbon-kilo-fruit-delaware
File name:b45fb6743a8f14da3b637d7ea1fd119c.dll
Download: download sample
Signature Heodo
File size:350'552 bytes
First seen:2021-01-20 14:51:35 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash af263152594d80bd9c18d0a70e4d94ec (26 x Heodo)
ssdeep 3072:D/GZgCBD0JqvjYGRKbGUUtvAMdg6Ygpr7kL2LWsFzMFruztyr1Bg:TGSkDgqvPRKib6+g8rtLWFcEpK
Threatray 256 similar samples on MalwareBazaar
TLSH 0274ADEAB8FBA455C78EE6716BD52DB6A9334F73028E91313F502ACD03935CC2AD2541
Reporter abuse_ch
Tags:dll Emotet Heodo

Intelligence


File Origin
# of uploads :
1
# of downloads :
135
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching a process
Sending a UDP request
Connection attempt
Sending an HTTP POST request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.EmotetCrypt
Status:
Malicious
First seen:
2021-01-20 12:56:33 UTC
AV detection:
21 of 29 (72.41%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:emotet botnet:epoch2 banker trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Blocklisted process makes network request
Emotet
Malware Config
C2 Extraction:
115.21.224.117:80
162.241.204.233:8080
50.116.111.59:8080
194.4.58.192:7080
120.150.60.189:80
172.104.97.173:8080
172.105.13.66:443
62.171.142.179:8080
110.142.236.207:80
62.75.141.82:80
203.153.216.189:7080
66.57.108.14:443
87.106.139.101:8080
120.150.218.241:443
115.94.207.99:443
173.70.61.180:80
2.58.16.89:8080
24.231.88.85:80
200.116.145.225:443
74.58.215.226:80
123.176.25.234:80
188.219.31.12:80
50.245.107.73:443
110.145.101.66:443
181.165.68.127:80
47.144.21.37:80
144.217.7.207:7080
157.245.99.39:8080
75.177.207.146:80
51.89.36.180:443
98.109.133.80:80
71.72.196.159:80
74.128.121.17:80
70.92.118.112:80
109.116.245.80:80
197.211.245.21:80
172.125.40.123:80
95.9.5.93:80
118.83.154.64:443
64.207.182.168:8080
167.114.153.111:8080
190.251.200.206:80
220.245.198.194:80
46.105.131.79:8080
49.205.182.134:80
181.171.209.241:443
139.162.60.124:8080
78.24.219.147:8080
121.124.124.40:7080
24.69.65.8:8080
190.103.228.24:80
174.118.202.24:443
185.201.9.197:8080
202.134.4.216:8080
94.23.237.171:443
70.183.211.3:80
134.209.144.106:443
41.185.28.84:8080
136.244.110.184:8080
37.187.72.193:8080
79.137.83.50:443
85.105.205.77:8080
24.178.90.49:80
89.106.251.163:80
59.21.235.119:80
95.213.236.64:8080
161.0.153.60:80
78.189.148.42:80
217.20.166.178:7080
180.222.161.85:80
75.113.193.72:80
186.74.215.34:80
202.134.4.211:8080
5.2.212.254:80
104.131.11.150:443
78.182.254.231:80
119.59.116.21:8080
78.188.225.105:80
176.111.60.55:8080
50.91.114.38:80
185.94.252.104:443
110.145.11.73:80
188.165.214.98:8080
24.179.13.119:80
172.86.188.251:8080
139.59.60.244:8080
139.99.158.11:443
138.68.87.218:443
69.49.88.46:80
85.105.111.166:80
74.40.205.197:443
86.98.21.56:443
37.139.21.175:8080
190.240.194.77:443
168.235.67.138:7080
187.161.206.24:80
194.190.67.75:80
74.208.45.104:8080
61.19.246.238:443
75.109.111.18:80
24.164.79.147:8080
5.39.91.110:7080
93.146.48.84:80
109.74.5.95:8080
89.216.122.92:80
Unpacked files
SH256 hash:
0b8ad413449454dd85f7a79c7600387658fb0e3e5b1b5ad8ab7119175551f819
MD5 hash:
b45fb6743a8f14da3b637d7ea1fd119c
SHA1 hash:
fb2d70b0d34d7311d9eb1b5c1f7d2ae5f07c8623
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:win_emotet_a2
Author:Slavo Greminger, SWITCH-CERT

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Heodo

DLL dll 0b8ad413449454dd85f7a79c7600387658fb0e3e5b1b5ad8ab7119175551f819

(this sample)

  
Delivery method
Distributed via web download

Comments