MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2779dbeff72d95abd2f569e19bde7ec40438dc84a7becd751e277489b592a345. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Emotet (aka Heodo)


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: 2779dbeff72d95abd2f569e19bde7ec40438dc84a7becd751e277489b592a345
SHA3-384 hash: ef795adfd1ac2c2f3edce2480ad0f496f20ff3adb22162a8cf00b3479891e1b72d4a3c96ab703aea0b88d47b92b1f06e
SHA1 hash: e14bd16be2adf5f1e949aba8f4c8fa84edb8af2c
MD5 hash: 0576d3f85c010c62238bdb3d30825dd1
humanhash: missouri-friend-sierra-angel
File name:ulhkhemlC.dll
Download: download sample
Signature Heodo
File size:373'248 bytes
First seen:2022-05-16 18:00:16 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 073e9094df66da2c3d6e17b86c2a33ec (66 x Heodo)
ssdeep 6144:EbmRW/X22TR72tKbxGeHkesyj1BQr6blJLUDblVpM54WWBKWuSIZ5ib0wj:E42Gi7/HpRBQrgI5M54riZYbf
Threatray 984 similar samples on MalwareBazaar
TLSH T16684C04573A48079EDB79338CC574A47E376B86907B0678F1364436A9F3F3919A3A321
TrID 48.7% (.EXE) Win64 Executable (generic) (10523/12/4)
23.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
9.3% (.EXE) OS/2 Executable (generic) (2029/13)
9.2% (.EXE) Generic Win/DOS Executable (2002/3)
9.2% (.EXE) DOS Executable Generic (2000/1)
Reporter TeamDreier
Tags:Emotet exe Heodo

Intelligence


File Origin
# of uploads :
1
# of downloads :
224
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
ulhkhemlC.dll
Verdict:
No threats detected
Analysis date:
2022-05-16 19:17:47 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a service
Launching a process
Sending a custom TCP request
Moving of the original file
Enabling autorun for a service
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
EvasionQueryPerformanceCounter
CheckCmdLine
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
control.exe greyware packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
80 / 100
Signature
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
Yara detected Emotet
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 627758 Sample: ulhkhemlC.dll Startdate: 16/05/2022 Architecture: WINDOWS Score: 80 39 Multi AV Scanner detection for domain / URL 2->39 41 Multi AV Scanner detection for submitted file 2->41 43 Yara detected Emotet 2->43 45 Machine Learning detection for sample 2->45 7 loaddll64.exe 1 2->7         started        9 svchost.exe 9 1 2->9         started        12 svchost.exe 2->12         started        14 4 other processes 2->14 process3 dnsIp4 16 regsvr32.exe 5 7->16         started        19 rundll32.exe 2 7->19         started        21 cmd.exe 1 7->21         started        23 2 other processes 7->23 31 127.0.0.1 unknown unknown 9->31 33 192.168.2.1 unknown unknown 9->33 process5 signatures6 37 Hides that the sample has been downloaded from the Internet (zone.identifier) 16->37 25 regsvr32.exe 16->25         started        29 rundll32.exe 21->29         started        process7 dnsIp8 35 104.248.225.227, 49774, 8080 DIGITALOCEAN-ASNUS United States 25->35 47 System process connects to network (likely due to code injection or exploit) 25->47 signatures9
Threat name:
Win64.Infostealer.Convagent
Status:
Malicious
First seen:
2022-05-16 18:01:07 UTC
File Type:
PE+ (Dll)
Extracted files:
1
AV detection:
8 of 41 (19.51%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:emotet botnet:epoch5 banker suricata trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: RenamesItself
Suspicious use of WriteProcessMemory
Emotet
suricata: ET MALWARE W32/Emotet CnC Beacon 3
Malware Config
C2 Extraction:
93.104.209.107:8080
195.154.146.35:443
202.134.4.210:7080
17.20.148.183:8907
185.148.168.220:8080
68.183.93.250:443
175.126.176.79:8080
77.31.27.120:26351
203.153.216.46:443
202.28.34.99:8080
210.57.209.142:8080
18.229.236.50:18850
36.67.23.59:443
159.69.237.188:443
107.22.159.198:7774
207.148.81.119:8080
54.38.143.246:7080
45.71.195.104:8080
108.159.107.249:48268
45.230.140.156:22366
103.56.149.105:8080
78.46.73.125:443
85.214.67.203:8080
66.42.57.149:443
51.68.141.164:8080
62.182.16.151:39225
54.37.106.167:8080
88.217.172.165:8080
190.90.233.66:443
5.56.132.177:8080
68.183.91.111:8080
188.225.32.231:4143
110.235.83.107:7080
217.182.143.207:443
54.37.228.122:443
103.41.204.169:8080
28.49.84.29:23589
104.248.225.227:8080
118.98.72.86:443
85.25.120.45:8080
54.38.242.185:443
37.44.244.177:8080
87.106.97.83:7080
50.189.40.86:7016
196.44.98.190:8080
108.158.100.139:6752
195.77.239.39:8080
80.11.183.113:63407
194.9.172.107:8080
62.171.178.147:8080
202.29.239.162:443
78.47.204.80:443
103.42.58.120:7080
37.59.209.141:8080
116.124.128.206:8080
139.196.72.155:8080
59.148.253.194:443
178.62.112.199:8080
54.12.95.56:36323
103.133.214.242:8080
72.98.79.0:64683
57.91.102.32:39354
89.99.222.230:14940
Unpacked files
SH256 hash:
2779dbeff72d95abd2f569e19bde7ec40438dc84a7becd751e277489b592a345
MD5 hash:
0576d3f85c010c62238bdb3d30825dd1
SHA1 hash:
e14bd16be2adf5f1e949aba8f4c8fa84edb8af2c
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments