MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 45989bd535e315d765c03ed327339b6bdc2fdc9977943c57827691d5fcd01b25. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Emotet (aka Heodo)


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: 45989bd535e315d765c03ed327339b6bdc2fdc9977943c57827691d5fcd01b25
SHA3-384 hash: 4693fa1885e3daa5b947cf22a0681aaa25da6405d08c92c7c0c84dfd17eca3404b9717e4a422ba3e59c9aa3fa371741a
SHA1 hash: 8080cb14fa0f50938a347d19eb60a7fe5c99bc2f
MD5 hash: 51c1dfbdeb1f6faec8a1007257889b59
humanhash: may-paris-emma-ohio
File name:pxcC3Q.dll
Download: download sample
Signature Heodo
File size:258'560 bytes
First seen:2021-11-16 13:10:40 UTC
Last seen:2021-11-16 15:39:52 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash 822ae775303d14fd9c529b33f0deaf77 (124 x Heodo)
ssdeep 6144:9ks3h7Usv9KgNXyyPSkDTQhJh1WTB5GCa:9kMgwWyqkDT0WTfxa
Threatray 54 similar samples on MalwareBazaar
TLSH T1F744CF01B280A072D9FF193A45F5C66A49AC7A500F90DDCF63984DBE5F725C2B6309EE
Reporter Anonymous
Tags:dll Emotet Heodo

Intelligence


File Origin
# of uploads :
2
# of downloads :
109
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching a process
Sending a UDP request
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
92 / 100
Signature
C2 URLs / IPs found in malware configuration
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
Yara detected Emotet
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 522844 Sample: pxcC3Q.dll Startdate: 16/11/2021 Architecture: WINDOWS Score: 92 33 210.57.217.132 UNAIR-AS-IDUniversitasAirlanggaID Indonesia 2->33 35 103.8.26.102 SKSATECH1-MYSKSATECHNOLOGYSDNBHDMY Malaysia 2->35 37 16 other IPs or domains 2->37 49 Multi AV Scanner detection for domain / URL 2->49 51 Found malware configuration 2->51 53 Multi AV Scanner detection for submitted file 2->53 55 3 other signatures 2->55 9 loaddll32.exe 1 2->9         started        11 svchost.exe 9 1 2->11         started        14 svchost.exe 1 2->14         started        16 3 other processes 2->16 signatures3 process4 dnsIp5 18 rundll32.exe 2 9->18         started        21 cmd.exe 1 9->21         started        39 127.0.0.1 unknown unknown 11->39 41 192.168.2.1 unknown unknown 11->41 process6 signatures7 47 Hides that the sample has been downloaded from the Internet (zone.identifier) 18->47 23 rundll32.exe 18->23         started        25 rundll32.exe 21->25         started        process8 process9 27 rundll32.exe 23->27         started        31 rundll32.exe 25->31         started        dnsIp10 43 81.0.236.93, 443, 49758 CASABLANCA-ASInternetCollocationProviderCZ Czech Republic 27->43 45 94.177.248.64, 443, 49761 ARUBACLOUDLTD-ASNGB Italy 27->45 57 System process connects to network (likely due to code injection or exploit) 27->57 signatures11
Threat name:
Win32.Trojan.Emotet
Status:
Malicious
First seen:
2021-11-16 13:11:06 UTC
AV detection:
25 of 27 (92.59%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:emotet botnet:epoch4 banker trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Blocklisted process makes network request
Emotet
Malware Config
C2 Extraction:
81.0.236.93:443
94.177.248.64:443
66.42.55.5:7080
103.8.26.103:8080
185.184.25.237:8080
45.76.176.10:8080
188.93.125.116:8080
103.8.26.102:8080
178.79.147.66:8080
58.227.42.236:80
45.118.135.203:7080
103.75.201.2:443
195.154.133.20:443
45.142.114.231:8080
212.237.5.209:443
207.38.84.195:8080
104.251.214.46:8080
138.185.72.26:8080
51.68.175.8:8080
210.57.217.132:8080
Unpacked files
SH256 hash:
45989bd535e315d765c03ed327339b6bdc2fdc9977943c57827691d5fcd01b25
MD5 hash:
51c1dfbdeb1f6faec8a1007257889b59
SHA1 hash:
8080cb14fa0f50938a347d19eb60a7fe5c99bc2f
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Distributed via e-mail link

Comments