MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6e988f3b0c9059931568ed86c551bbc37770934b792dc9559651afa925a9c32f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Emotet (aka Heodo)


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments 1

SHA256 hash: 6e988f3b0c9059931568ed86c551bbc37770934b792dc9559651afa925a9c32f
SHA3-384 hash: 48c5ac5489accd85862adf1aca964b47128dc2d2cea9bee4ce34015b7920904adf5ba64f35748e806450c748d1be76a0
SHA1 hash: 1292c88feda3dc471a8b2d19d68cac4f7911e007
MD5 hash: 43cfbfb0bf6aab0ae3591d3e79e917ad
humanhash: berlin-wyoming-blossom-october
File name:43cfbfb0bf6aab0ae3591d3e79e917ad
Download: download sample
Signature Heodo
File size:481'792 bytes
First seen:2022-01-12 14:57:48 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash 3773ad24a3d7afbf38a113a01a5bf2a6 (55 x Heodo)
ssdeep 6144:Xta0vtmjG1ishZb/3QJkCrpGXtWMJw0iwg/GPAOanmCBPASUA5LtKn32OOW2ynWy:XQLHshZb/gJkCOiwEGPBCWCo2Ol2ynW
TLSH T1B6A4BF50B552C072D4FE10302928EBAA0DBD7D314FA495EBA7E01E7E8D352D19732A7B
Reporter zbetcheckin
Tags:32 dll Emotet exe Heodo

Intelligence


File Origin
# of uploads :
1
# of downloads :
131
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a custom TCP request
Launching a process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
control.exe greyware packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
88 / 100
Signature
Antivirus / Scanner detection for submitted sample
C2 URLs / IPs found in malware configuration
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Multi AV Scanner detection for submitted file
Sigma detected: Suspicious Call by Ordinal
Tries to detect virtualization through RDTSC time measurements
Yara detected Emotet
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 551857 Sample: P3H1GxrKtk Startdate: 12/01/2022 Architecture: WINDOWS Score: 88 34 210.57.209.142 UNAIR-AS-IDUniversitasAirlanggaID Indonesia 2->34 36 85.214.67.203 STRATOSTRATOAGDE Germany 2->36 38 25 other IPs or domains 2->38 40 Found malware configuration 2->40 42 Antivirus / Scanner detection for submitted sample 2->42 44 Multi AV Scanner detection for submitted file 2->44 46 3 other signatures 2->46 9 loaddll32.exe 1 2->9         started        signatures3 process4 signatures5 50 Tries to detect virtualization through RDTSC time measurements 9->50 12 cmd.exe 1 9->12         started        14 rundll32.exe 2 9->14         started        17 regsvr32.exe 9->17         started        19 3 other processes 9->19 process6 signatures7 21 rundll32.exe 12->21         started        52 Hides that the sample has been downloaded from the Internet (zone.identifier) 14->52 24 rundll32.exe 14->24         started        54 Tries to detect virtualization through RDTSC time measurements 17->54 26 rundll32.exe 17->26         started        28 rundll32.exe 19->28         started        30 rundll32.exe 19->30         started        process8 signatures9 48 Tries to detect virtualization through RDTSC time measurements 21->48 32 rundll32.exe 21->32         started        process10
Threat name:
Win32.Trojan.Fragtor
Status:
Malicious
First seen:
2022-01-12 14:58:14 UTC
File Type:
PE (Dll)
Extracted files:
4
AV detection:
14 of 43 (32.56%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Unpacked files
SH256 hash:
b707ebe100382fc83ad36a88e327bd1f319f0ca31f936381bbe7bb6be8f85c76
MD5 hash:
1bd2bd10ce6e012d323c329814f72eaa
SHA1 hash:
8d69979261205c3a54cb9520b8dde10c17fec85e
Detections:
win_emotet_a2 win_emotet_auto
SH256 hash:
6e988f3b0c9059931568ed86c551bbc37770934b792dc9559651afa925a9c32f
MD5 hash:
43cfbfb0bf6aab0ae3591d3e79e917ad
SHA1 hash:
1292c88feda3dc471a8b2d19d68cac4f7911e007
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Heodo

DLL dll 6e988f3b0c9059931568ed86c551bbc37770934b792dc9559651afa925a9c32f

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2022-01-12 14:57:58 UTC

url : hxxps://mewb.org/wp-admin/2fcpQyzanzkiO1/