MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a88691be2dee049c4df8247d08229a9ac1c327e3249e985aa4f1b513b1b52b0a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Emotet (aka Heodo)


Vendor detections: 6


Maldoc score: 9


Intelligence 6 IOCs YARA 2 File information Comments

SHA256 hash: a88691be2dee049c4df8247d08229a9ac1c327e3249e985aa4f1b513b1b52b0a
SHA3-384 hash: b7371792ecf450828b16ab89c5975c3bb60616a99d7f2231d3bce2c2ed1312e0788fab75c82c0d2105141a01f7c1080c
SHA1 hash: 3b3f8c9efec98cb5373f8c0e57aec1ce65857943
MD5 hash: 5518909e456a43c1bd9a26221521b9cb
humanhash: harry-single-sad-summer
File name:Faktur.doc
Download: download sample
Signature Heodo
File size:182'272 bytes
First seen:2020-10-27 14:40:03 UTC
Last seen:Never
File type:Word file doc
MIME type:application/msword
ssdeep 1536:3O0TGzLKC5MzdH6iKV9w2yiLaTz6ufw2MPRdwqwXTSuH7plpxBl2RbOp95mRb9d:3JivKie6B/w2yiWydwtXOWeQmRb9d
TLSH E604B389A184FD59FA578E300DCBEAFA61136C113D1AC2C764D97BFB5877934AAD3200
Reporter GovCERT_CH
Tags:Emotet Heodo

Office OLE Information


This malware samples appears to be an Office document. The following table provides more information about this document using oletools and oledump.

OLE id
Maldoc score: 9
Application name is Microsoft Office Word
Office document is in OLE format
Office document contains VBA Macros
OLE vba

MalwareBazaar was able to extract and deobfuscate VBA script(s) the following information from OLE objects embedded in this file using olevba:

TypeKeywordDescription
AutoExecDocument_openRuns when the Word or Publisher document is opened
SuspiciousCreateMay execute file or a system command through WMI
SuspiciousshowwindowMay hide the application
SuspiciousCreateObjectMay create an OLE object
SuspiciousHex StringsHex-encoded strings were detected, may be used to obfuscate strings (option --decode to see all)

Intelligence


File Origin
# of uploads :
1
# of downloads :
69
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Using the Windows Management Instrumentation requests
Creating a process with a hidden window
DNS request
Sending an HTTP GET request
Possible injection to a system process
Sending a TCP request to an infection source
Launching a process by exploiting the app vulnerability
Threat name:
Document-Word.Trojan.Heuristic
Status:
Malicious
First seen:
2020-10-26 13:38:38 UTC
AV detection:
19 of 48 (39.58%)
Threat level:
  2/5
Result
Malware family:
Score:
  10/10
Tags:
family:emotet botnet:epoch3 banker trojan
Behaviour
Modifies Internet Explorer settings
Modifies registry class
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Checks processor information in registry
Enumerates system info in registry
Office loads VBA resources, possible macro or embedded object present
Drops file in Windows directory
Drops file in System32 directory
Blacklisted process makes network request
Executes dropped EXE
Emotet Payload
Emotet
Process spawned unexpected child process
Malware Config
C2 Extraction:
61.118.67.173:80
91.121.200.35:8080
159.203.16.11:8080
188.226.165.170:8080
2.58.16.86:8080
126.126.139.26:443
46.32.229.152:8080
179.5.118.12:80
46.105.131.68:8080
103.229.73.17:8080
223.17.215.76:80
47.154.85.229:80
51.38.50.144:8080
178.33.167.120:8080
190.192.39.136:80
202.29.237.113:8080
213.165.178.214:80
123.216.134.52:80
115.79.195.246:80
54.38.143.245:8080
185.63.32.149:80
91.83.93.103:443
115.79.59.157:80
91.75.75.46:80
153.229.219.1:443
78.90.78.210:80
192.163.221.191:8080
5.12.246.155:80
190.117.101.56:80
95.76.142.243:80
50.116.78.109:8080
85.75.49.113:80
190.85.46.52:7080
77.74.78.80:443
162.144.145.58:8080
185.80.172.199:80
73.55.128.120:80
118.7.227.42:443
195.201.56.70:8080
190.164.135.81:80
82.78.179.117:443
188.166.220.180:7080
181.59.59.54:80
188.80.27.54:80
183.91.3.63:80
103.93.220.182:80
177.130.51.198:80
178.254.36.182:8080
110.37.224.243:80
45.239.204.100:80
203.56.191.129:8080
180.148.4.130:8080
192.241.220.183:8080
109.13.179.195:80
60.108.128.186:80
85.246.78.192:80
190.180.65.104:80
58.94.58.13:80
37.205.9.252:7080
190.194.12.132:80
192.210.217.94:8080
5.79.70.250:8080
190.212.140.6:80
120.51.34.254:80
185.142.236.163:443
175.103.38.146:80
41.185.29.128:8080
42.200.96.63:80
75.127.14.170:8080
121.117.147.153:443
200.243.153.66:80
143.95.101.72:8080
198.20.228.9:8080
187.193.221.143:80
86.123.55.0:80
37.46.129.215:8080
116.202.10.123:8080
185.208.226.142:8080
36.91.44.183:80
139.59.12.63:8080
103.80.51.61:8080
197.221.227.78:80
74.208.173.91:8080
109.206.139.119:80
8.4.9.137:8080
113.161.148.81:80
139.59.61.215:443
172.96.190.154:8080
172.193.79.237:80
117.2.139.117:443
58.27.215.3:8080
113.203.238.130:80
73.100.19.104:80
41.76.213.144:8080
190.55.186.229:80
203.153.216.178:7080
172.105.78.244:8080
5.2.246.108:80
79.133.6.236:8080
157.7.164.178:8081
Dropper Extraction:
https://madrushdigital.com/wp-admin/OJ5Uu5J/
http://heankan.bio/js/T8oCHm/
https://jupitermarinesales.com/wp-content/cache/xLWIP/
https://lovetraveltoday.com/localisationl/0zwJxNkMRK/
https://unikaryapools.com/wp/JWUG4n/
http://www.akdgroup.co.in/jio/8vSciyhM/
http://ufak2.com/demo/2hhpCYzwTL/
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_Heodo_doc_20200916
Author:abuse.ch
Description:Detects Heodo DOC
Rule name:ach_Heodo_doc_gen_2
Author:abuse.ch
Description:Detects Heodo (aka Emotet) DOC

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Heodo

Word file doc a88691be2dee049c4df8247d08229a9ac1c327e3249e985aa4f1b513b1b52b0a

(this sample)

Comments