MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 674cac26b5ee006a476669c6857e24a8187ef94945d521c8bbe9069ec74494ba. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Emotet (aka Heodo)


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 674cac26b5ee006a476669c6857e24a8187ef94945d521c8bbe9069ec74494ba
SHA3-384 hash: 188910eedcefec1ef6b47a3e02035dab0c1ad153a45558447f0bc138205623ccaeabfec48c04dacaaff7eeb2712b4d64
SHA1 hash: c76261fcdd676ba5d010d3faf147d4c7ec62ff0b
MD5 hash: d684f1e64024f3866ac6e81053b397a9
humanhash: mockingbird-wolfram-pip-island
File name:674cac26b5ee006a476669c6857e24a8187ef94945d521c8bbe9069ec74494ba
Download: download sample
Signature Heodo
File size:5'716'480 bytes
First seen:2020-08-24 05:17:30 UTC
Last seen:2020-08-24 05:56:41 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 98304:zI0ZQJg51unhjXTm1IHYwHX/cc9PsaKqwaMESsU/5Z3LXq6Yr7igSM7:zIsQJ1hf2IL39kewvFsc5ZbnYrQK
Threatray 1 similar samples on MalwareBazaar
TLSH C546F1043B5CB92EE03F677570518E9982F0C963E7E7EECD7911659C0E0D388ED8629A
Reporter Lokesh42651261
Tags:BitRAT Emotet Heodo

Intelligence


File Origin
# of uploads :
2
# of downloads :
94
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a window
Creating a file
Sending a UDP request
DNS request
Result
Threat name:
Unknown
Detection:
suspicious
Classification:
n/a
Score:
36 / 100
Signature
A
b
c
d
e
f
i
l
M
n
o
r
S
t
u
V
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.Razy
Status:
Malicious
First seen:
2020-07-21 17:29:37 UTC
File Type:
PE (.Net Exe)
Extracted files:
12
AV detection:
21 of 48 (43.75%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
Loads dropped DLL
Loads dropped DLL
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments