MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0e09441ba2045262709dcc48792a770437b44ec1ab6ecef040a87e0853e2db16. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Emotet (aka Heodo)


Vendor detections: 18


Intelligence 18 IOCs YARA 1 File information Comments

SHA256 hash: 0e09441ba2045262709dcc48792a770437b44ec1ab6ecef040a87e0853e2db16
SHA3-384 hash: 73f3032f4c59045c147cf29476db6e6d5062ba2767fb77c714d215657172147f0b6bd32cebb6af77a1c86e04705ffe3e
SHA1 hash: c64234fdc6bdaf57a3726cdf5e7a7ae31aa40af4
MD5 hash: ceb9996a65f83ca779def540aab57603
humanhash: solar-floor-winter-twelve
File name:ExeFile (145).exe
Download: download sample
Signature Heodo
File size:868'352 bytes
First seen:2024-08-20 14:09:10 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 4e4c2573ec91640cc3539c50c7325d1d (126 x Heodo)
ssdeep 6144:/TaQZdJnaB1kNO9FSm9tc6c6c6c6c6c6c6c6c6csImOksMWNIDK:/GQfJuFrz7
Threatray 295 similar samples on MalwareBazaar
TLSH T157050682FA4181B4C5FB10757836CD9102FEEF2569329E33A785778FCD3A5866B22325
TrID 50.1% (.CPL) Windows Control Panel Item (generic) (57583/11/19)
27.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
9.1% (.EXE) Win64 Executable (generic) (10523/12/4)
4.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
3.9% (.EXE) Win32 Executable (generic) (4504/4/1)
dhash icon 0030706871b25428 (3 x Heodo)
Reporter byMattii1234
Tags:Emotet Heodo

Intelligence


File Origin
# of uploads :
1
# of downloads :
142
Origin country :
DE DE
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
ExeFile (145).exe
Verdict:
Malicious activity
Analysis date:
2024-08-20 14:11:57 UTC
Tags:
emotet stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.1%
Tags:
Execution Generic Infostealer Network Other Stealth Trojan Emotet
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
crypto emotet epmicrosoft_visual_cc fingerprint iceid keylogger microsoft_visual_cc threat unknown
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
AI detected suspicious sample
Antivirus / Scanner detection for submitted sample
C2 URLs / IPs found in malware configuration
Drops executables to the windows directory (C:\Windows) and starts them
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Emotet
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Emotet
Status:
Malicious
First seen:
2020-08-30 06:47:00 UTC
File Type:
PE (Exe)
Extracted files:
56
AV detection:
32 of 38 (84.21%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:emotet botnet:epoch2 banker discovery trojan
Behaviour
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
System Location Discovery: System Language Discovery
Emotet
Malware Config
C2 Extraction:
67.68.210.95:80
162.241.242.173:8080
45.55.36.51:443
45.55.219.163:443
68.188.112.97:80
46.105.131.79:8080
78.24.219.147:8080
37.70.8.161:80
153.232.188.106:80
209.141.54.221:8080
203.117.253.142:80
152.168.248.128:443
93.147.212.206:80
24.137.76.62:80
189.212.199.126:443
204.197.146.48:80
137.119.36.33:80
185.94.252.104:443
139.130.242.43:80
203.153.216.189:7080
200.114.213.233:8080
41.60.200.34:80
107.5.122.110:80
139.162.108.71:8080
137.59.187.107:8080
181.230.116.163:80
24.43.99.75:80
83.169.36.251:8080
95.179.229.244:8080
85.152.162.105:80
37.139.21.175:8080
98.109.204.230:80
139.59.60.244:8080
75.139.38.211:80
61.19.246.238:443
79.98.24.39:8080
69.30.203.214:8080
68.171.118.7:80
50.81.3.113:80
89.205.113.80:80
87.106.136.232:8080
74.109.108.202:80
95.213.236.64:8080
24.179.13.119:80
121.124.124.40:7080
70.121.172.89:80
74.120.55.163:80
104.131.44.150:8080
74.208.45.104:8080
1.221.254.82:80
187.161.206.24:80
188.219.31.12:80
180.92.239.110:8080
47.146.117.214:80
103.86.49.11:8080
190.55.181.54:443
104.236.246.93:8080
97.82.79.83:80
91.211.88.52:7080
84.39.182.7:80
110.145.77.103:80
94.23.237.171:443
85.105.205.77:8080
87.106.139.101:8080
200.41.121.90:80
157.245.99.39:8080
169.239.182.217:8080
67.205.85.243:8080
176.111.60.55:8080
174.45.13.118:80
167.86.90.214:8080
174.102.48.180:443
112.185.64.233:80
173.81.218.65:80
139.99.158.11:443
113.160.130.116:8443
201.173.217.124:443
62.75.141.82:80
174.137.65.18:80
172.91.208.86:80
5.196.74.210:8080
85.66.181.138:80
47.144.21.12:443
194.187.133.160:443
168.235.67.138:7080
104.131.11.150:443
190.160.53.126:80
37.187.72.193:8080
109.74.5.95:8080
120.150.60.189:80
94.200.114.161:80
216.208.76.186:80
173.62.217.22:443
62.30.7.67:443
5.39.91.110:7080
Unpacked files
SH256 hash:
d384033393d0155a314d4eea525ed8e9c9a43252c4123a686c96ffa54f7b06bc
MD5 hash:
cb388fc662736d28fe2f3ff5d20bf1ef
SHA1 hash:
a8d462ffecff2dff2c62d9be2f78c843e15f3dbc
Detections:
win_emotet_auto win_emotet_a2 Emotet
SH256 hash:
0e09441ba2045262709dcc48792a770437b44ec1ab6ecef040a87e0853e2db16
MD5 hash:
ceb9996a65f83ca779def540aab57603
SHA1 hash:
c64234fdc6bdaf57a3726cdf5e7a7ae31aa40af4
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NET
Author:malware-lu

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Heodo

Executable exe 0e09441ba2045262709dcc48792a770437b44ec1ab6ecef040a87e0853e2db16

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CloseHandle
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryA
KERNEL32.dll::GetSystemInfo
KERNEL32.dll::GetStartupInfoA
KERNEL32.dll::GetCommandLineA
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::SetStdHandle
WIN_CRYPT_APIUses Windows Crypt APIADVAPI32.dll::CryptAcquireContextA
WIN_REG_APICan Manipulate Windows RegistryADVAPI32.dll::RegCreateKeyExA
ADVAPI32.dll::RegDeleteKeyA
ADVAPI32.dll::RegOpenKeyA
ADVAPI32.dll::RegOpenKeyExA
ADVAPI32.dll::RegQueryValueExA
ADVAPI32.dll::RegQueryValueA
WIN_USER_APIPerforms GUI ActionsUSER32.dll::PeekMessageA
USER32.dll::CreateWindowExA

Comments