MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6963dd79aa16d012852bf32ca91f7eff536b68af95814d28d207b9db6a2bbd96. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Emotet (aka Heodo)


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 6963dd79aa16d012852bf32ca91f7eff536b68af95814d28d207b9db6a2bbd96
SHA3-384 hash: 0e0804b68958a99e3f696de1f897a599e1c41a40a33938dc3340b743df564d7565e4f8c2feb52e8e33e29665820cedda
SHA1 hash: 6d6c51af00d3a074d757d9ae746a01b059f1a519
MD5 hash: 3fd55e7330d8d216b1d619249c431c27
humanhash: spaghetti-fish-missouri-texas
File name:emotet_exe_e5_6963dd79aa16d012852bf32ca91f7eff536b68af95814d28d207b9db6a2bbd96_2022-02-06__145042.exe
Download: download sample
Signature Heodo
File size:213'420 bytes
First seen:2022-02-06 14:50:46 UTC
Last seen:2022-02-06 16:35:52 UTC
File type:DLL dll
MIME type:application/x-dosexec
ssdeep 6144:2D/Tuk02QyxDxkXOQTnjuwibXGmkEovJKt4kI0lkI9sJD8Mm0czMm8QTymiVNWzy:2D/Tukcyj1Giqjxq4s2IuJIMm0WKQTyZ
TLSH T14A24ADA43B56A425F214672A1EC796005FE8D23248F3D09EDFC2F3A4A5FB442EB5D12D
Reporter Cryptolaemus1
Tags:dll Emotet epoch5 exe Heodo


Avatar
Cryptolaemus1
Emotet epoch5 exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
186
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
DNS request
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2022-02-06 14:51:10 UTC
File Type:
PE (Dll)
AV detection:
6 of 28 (21.43%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
n/a
Score:
  4/10
Tags:
n/a
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Drops file in Windows directory
Unpacked files
SH256 hash:
6963dd79aa16d012852bf32ca91f7eff536b68af95814d28d207b9db6a2bbd96
MD5 hash:
3fd55e7330d8d216b1d619249c431c27
SHA1 hash:
6d6c51af00d3a074d757d9ae746a01b059f1a519
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments