MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a60549d08d066eeb7cce46f19cd62b426b82f5f56512f9a6cd3c9781f3a67a6b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Emotet (aka Heodo)


Vendor detections: 5


Intelligence 5 IOCs YARA 2 File information Comments 1

SHA256 hash: a60549d08d066eeb7cce46f19cd62b426b82f5f56512f9a6cd3c9781f3a67a6b
SHA3-384 hash: 0845b82941453260ab5a1712df63f26cd57d08dd19c1cee836abbb5d557cb39a580ed8ee06158df2ebc8aa919798c917
SHA1 hash: 86a7ae8a7b71f0df8c4731693ce57f0e73309334
MD5 hash: e19685fb5d65e400f2dc9f6af799e637
humanhash: don-chicken-september-oklahoma
File name:e19685fb5d65e400f2dc9f6af799e637
Download: download sample
Signature Heodo
File size:9'168'384 bytes
First seen:2021-07-06 07:09:10 UTC
Last seen:2021-07-06 09:40:04 UTC
File type:Executable exe
MIME type:application/x-dosexec
ssdeep 196608:hDAQAUixXAdXU4ZkgCnU+Yu26kuA/CHksNE+fBJ+BM3D:hRAxxS/BCU+o6kJCHksK+VD
Threatray 129 similar samples on MalwareBazaar
TLSH B99622C1A3C11114D8A43EB9904DC13D6B5EDE496363BA1E28D23AD4B2745A44FE3FEE
Reporter zbetcheckin
Tags:Emotet exe Heodo

Intelligence


File Origin
# of uploads :
3
# of downloads :
757
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
e19685fb5d65e400f2dc9f6af799e637
Verdict:
No threats detected
Analysis date:
2021-07-06 07:12:40 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
92 / 100
Signature
Creates an undocumented autostart registry key
Injects a PE file into a foreign processes
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Suspicious Process Start Without DLL
Sigma detected: WScript or CScript Dropper
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected AntiVM3
Behaviour
Behavior Graph:
Threat name:
Win64.Trojan.Bulz
Status:
Malicious
First seen:
2021-07-06 07:09:16 UTC
AV detection:
9 of 46 (19.57%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
persistence
Behaviour
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Loads dropped DLL
Executes dropped EXE
Modifies WinLogon for persistence
Unpacked files
SH256 hash:
a60549d08d066eeb7cce46f19cd62b426b82f5f56512f9a6cd3c9781f3a67a6b
MD5 hash:
e19685fb5d65e400f2dc9f6af799e637
SHA1 hash:
86a7ae8a7b71f0df8c4731693ce57f0e73309334
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Glasses
Author:Seth Hardy
Description:Glasses family
Rule name:GlassesCode
Author:Seth Hardy
Description:Glasses code features

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Heodo

Executable exe a60549d08d066eeb7cce46f19cd62b426b82f5f56512f9a6cd3c9781f3a67a6b

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2021-07-06 07:09:11 UTC

url : hxxp://andmaindance.art/gder/mod/ConsoleApp2.exe