MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8d6912a12fdccb3d6d55980c3b1fd20cc97a2736d3381e315657a3d6f2f8d1b3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Emotet (aka Heodo)


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments 1

SHA256 hash: 8d6912a12fdccb3d6d55980c3b1fd20cc97a2736d3381e315657a3d6f2f8d1b3
SHA3-384 hash: b7a9729f7a326cd303c929969b8b307a065207412e2dade3a8ac47a74f1efd9e7de7ea31a376cf032bf3174c999d045b
SHA1 hash: 27836d3e04a31548fa09ec8537ba50777a73a42a
MD5 hash: 6988533cf7cbdccd0ea429571e0441a9
humanhash: gee-green-iowa-burger
File name:6988533cf7cbdccd0ea429571e0441a9
Download: download sample
Signature Heodo
File size:473'600 bytes
First seen:2021-12-02 08:18:45 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash 057d91f9747659ff50a0558e0aed5a44 (7 x Heodo)
ssdeep 12288:mFyGBDytNZAR5Myju+qQuj/J+7C6Dg8stHb1h:mF92e/jEk7zDg8stJh
Threatray 240 similar samples on MalwareBazaar
TLSH T1ADA4BF20B961C036E4AE10303D68D6EA056F7D364FF0CADB67E42F6D4E352C16B3566A
Reporter zbetcheckin
Tags:32 dll Emotet exe Heodo

Intelligence


File Origin
# of uploads :
1
# of downloads :
93
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Launching a process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
67%
Tags:
emotet greyware packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
80 / 100
Signature
C2 URLs / IPs found in malware configuration
Found malware configuration
Found potential dummy code loops (likely to delay analysis)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Multi AV Scanner detection for submitted file
Tries to detect virtualization through RDTSC time measurements
Yara detected Emotet
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 532429 Sample: UioA2E9DBG Startdate: 02/12/2021 Architecture: WINDOWS Score: 80 34 210.57.217.132 UNAIR-AS-IDUniversitasAirlanggaID Indonesia 2->34 36 203.114.109.124 TOT-LLI-AS-APTOTPublicCompanyLimitedTH Thailand 2->36 38 27 other IPs or domains 2->38 42 Found malware configuration 2->42 44 Multi AV Scanner detection for submitted file 2->44 46 Yara detected Emotet 2->46 48 C2 URLs / IPs found in malware configuration 2->48 9 loaddll32.exe 1 2->9         started        12 svchost.exe 1 1 2->12         started        signatures3 process4 dnsIp5 50 Tries to detect virtualization through RDTSC time measurements 9->50 15 rundll32.exe 2 9->15         started        18 cmd.exe 1 9->18         started        20 rundll32.exe 9->20         started        22 2 other processes 9->22 40 127.0.0.1 unknown unknown 12->40 signatures6 process7 signatures8 52 Found potential dummy code loops (likely to delay analysis) 15->52 54 Tries to detect virtualization through RDTSC time measurements 15->54 56 Hides that the sample has been downloaded from the Internet (zone.identifier) 15->56 24 rundll32.exe 15->24         started        26 rundll32.exe 18->26         started        28 rundll32.exe 20->28         started        30 rundll32.exe 22->30         started        process9 process10 32 rundll32.exe 26->32         started       
Threat name:
Win32.Trojan.Fragtor
Status:
Malicious
First seen:
2021-12-02 08:19:13 UTC
File Type:
PE (Dll)
Extracted files:
4
AV detection:
13 of 44 (29.55%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of NtCreateProcessExOtherParentProcess
Unpacked files
SH256 hash:
351c499ab0db6c3d51305b9041babb6625c1b11375e85626b21fe39210cd6fb2
MD5 hash:
29dfea21774551a30d3990eac51d018f
SHA1 hash:
94c20b3556d7286a3a2093bf4d57d558b185a6f3
Detections:
win_emotet_a2 win_emotet_auto
SH256 hash:
8d6912a12fdccb3d6d55980c3b1fd20cc97a2736d3381e315657a3d6f2f8d1b3
MD5 hash:
6988533cf7cbdccd0ea429571e0441a9
SHA1 hash:
27836d3e04a31548fa09ec8537ba50777a73a42a
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Heodo

DLL dll 8d6912a12fdccb3d6d55980c3b1fd20cc97a2736d3381e315657a3d6f2f8d1b3

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2021-12-02 08:18:47 UTC

url : hxxps://thetrendskill.com/wp-content/uH11/