MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 aa2c9cd64d2d506e675fa864f8f76010bc6dfd1594e8d454b94bff59862cbccc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Emotet (aka Heodo)


Vendor detections: 11


Intelligence 11 IOCs YARA 1 File information Comments

SHA256 hash: aa2c9cd64d2d506e675fa864f8f76010bc6dfd1594e8d454b94bff59862cbccc
SHA3-384 hash: 13f37c558f362b1e99426fbd970ed821188f9dd7a2c762dc76a988a8dcdfa450f1bef00a7cd03dbfde582d5f53e20e56
SHA1 hash: 0cd32c55053f750737050728110ef03601646504
MD5 hash: 23b720754da8e96968b0fb9d94733bec
humanhash: montana-minnesota-sierra-missouri
File name:xuvSckbPV2c1Z88PvPguO.dll
Download: download sample
Signature Heodo
File size:598'016 bytes
First seen:2022-03-29 12:47:38 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash 00527f58aa0dd3e43dc95b9f7ec54d7a (28 x Heodo)
ssdeep 6144:PACAdVxYSBw26kcI6LQF7q7pyDznipvdR4oe9PSji13ugTeoD/E+VE+VE+S:PkxeI6LQF+wQooe9aji178
Threatray 873 similar samples on MalwareBazaar
TLSH T105D45ACB6ECC80BAE15E22373856B775B526ED004AB4B2C73E63797DD93B5410A6C603
File icon (PE):PE icon
dhash icon 0460f0b4b6cc4413 (26 x Heodo)
Reporter TeamDreier
Tags:dll Emotet Heodo

Intelligence


File Origin
# of uploads :
1
# of downloads :
172
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a custom TCP request
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
control.exe greyware keylogger shell32.dll
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
92 / 100
Signature
C2 URLs / IPs found in malware configuration
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Sigma detected: Regsvr32 Command Line Without DLL
Sigma detected: Regsvr32 Network Activity
Sigma detected: Suspicious Call by Ordinal
System process connects to network (likely due to code injection or exploit)
Yara detected Emotet
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 599189 Sample: xuvSckbPV2c1Z88PvPguO.dll Startdate: 29/03/2022 Architecture: WINDOWS Score: 92 34 129.232.188.93 xneeloZA South Africa 2->34 36 189.232.46.161 UninetSAdeCVMX Mexico 2->36 38 56 other IPs or domains 2->38 44 Found malware configuration 2->44 46 Yara detected Emotet 2->46 48 C2 URLs / IPs found in malware configuration 2->48 50 3 other signatures 2->50 9 loaddll32.exe 1 2->9         started        11 svchost.exe 1 1 2->11         started        14 svchost.exe 1 2->14         started        16 3 other processes 2->16 signatures3 process4 dnsIp5 18 cmd.exe 1 9->18         started        20 regsvr32.exe 2 9->20         started        23 rundll32.exe 2 9->23         started        25 rundll32.exe 9->25         started        40 127.0.0.1 unknown unknown 11->40 process6 signatures7 27 rundll32.exe 2 18->27         started        52 Hides that the sample has been downloaded from the Internet (zone.identifier) 20->52 process8 signatures9 54 Hides that the sample has been downloaded from the Internet (zone.identifier) 27->54 30 regsvr32.exe 27->30         started        process10 dnsIp11 42 159.203.141.156, 49773, 8080 DIGITALOCEAN-ASNUS United States 30->42 56 System process connects to network (likely due to code injection or exploit) 30->56 signatures12
Threat name:
Win32.Trojan.Emotet
Status:
Malicious
First seen:
2022-03-29 12:48:15 UTC
File Type:
PE (Dll)
Extracted files:
43
AV detection:
23 of 26 (88.46%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:emotet botnet:epoch4 banker trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Emotet
Malware Config
C2 Extraction:
159.203.141.156:8080
79.143.187.147:443
189.232.46.161:443
51.91.76.89:8080
119.193.124.41:7080
176.104.106.96:8080
1.234.21.73:7080
82.165.152.127:8080
167.172.253.162:8080
153.126.146.25:7080
216.158.226.206:443
103.75.201.2:443
188.44.20.25:443
101.50.0.91:8080
159.65.88.10:8080
176.56.128.118:443
72.15.201.15:8080
203.114.109.124:443
212.237.17.99:8080
192.99.251.50:443
50.30.40.196:8080
173.212.193.249:8080
189.126.111.200:7080
195.154.133.20:443
58.227.42.236:80
46.55.222.11:443
45.176.232.124:443
195.201.151.129:8080
151.106.112.196:8080
209.250.246.206:443
131.100.24.231:80
1.234.2.232:8080
164.68.99.3:8080
51.91.7.5:8080
167.99.115.35:8080
5.9.116.246:8080
185.8.212.130:7080
31.24.158.56:8080
45.142.114.231:8080
79.172.212.216:8080
45.118.135.203:7080
146.59.226.45:443
178.79.147.66:8080
159.8.59.82:8080
158.69.222.101:443
50.116.54.215:443
196.218.30.83:443
129.232.188.93:443
45.118.115.99:8080
51.254.140.238:7080
209.126.98.206:8080
107.182.225.142:8080
134.122.66.193:8080
185.157.82.211:8080
110.232.117.186:8080
197.242.150.244:8080
103.43.46.182:443
212.24.98.99:8080
201.94.166.162:443
Unpacked files
SH256 hash:
e3f005ce906eb15a56beff6ed6f1e52b625dc141d512b9e3dd007c48204bcd6a
MD5 hash:
5401525e44275984e8a4e923a4bf5722
SHA1 hash:
d2e3284b1c9c9403fd6fe783c25f3aaa101acb82
Detections:
win_emotet_a2 win_emotet_auto
Parent samples :
408206fb36ef3ef7e56c8ecbb047c4f2e8ff7a30ee9d57ef593ce4cbd691f622
83444029cf8d82c80992c2e4290474d557df615f8cfb50ef1c66093f012b778f
9bd03e4f57247c45ad85cd0658ad9fa1635bddbe1e64bf6a068096a8478cbd3d
7fff027fdb387dbae2deca5ca30597fe798160d9861b17b024cc3115e6b552c0
dcc57b9ea0096318a01477f0d7d509e8e32261a8f6db81a8325b47e417650e4b
62cecf2097383a7d64093334ffd026ce0c1f55b5ef11570a7a7d57a8b9d4318c
1f8ac6e2088e18b946a4ae19077f18654734dbcdffbb2a6711c658e243530a91
61330bcffa1b670bba5bb2e42e9a8f0021b9ef880029414f93d883387945afba
2cd7331956daeba2312eb8d5173a16a5cef50b847f5ed7c8a9def5053c84d7fe
9f3d2a27d8312e87ffadb658627ea6333c6ae907ee7c060899522900b4d3369a
05e8b2ee5ed29fa14d1c7b36adf334b881b6f045c070b369897d029feb9ded04
aca091d06d3bccef5a695a4522de6012a3c1dd9040a550238c010af9acd41fbb
9511817372e57c6aec96c99b4624b9e4ff65162dddbc67579e0e7431b61f1d94
5eb46927e22c166855803d987aa0fee87d7c949d7e2883543daf51e5964eb9c8
aa2c9cd64d2d506e675fa864f8f76010bc6dfd1594e8d454b94bff59862cbccc
d6db4c07cb2339ef6932854d8064dc43cd14a89eeeba66e99dbded0871f9e8ec
665121ebdd5ad9b1bc7f0bdb95b504f6b7609a8c910dd029da8681a217501a3d
938f75e4dfc8b72dd5cdd167941343be85f8f9fa87a389caa5f1a602478d8924
aa83bcfead22bdd0310f41073c49f497a689c04c59c51e61e626c6d8f1f13a13
cc8c164f7cbe16f316abe9aeb5c3088ab1d435973f2578b599749a9647c0b8b9
cd565bf4d6f2704de80b6499dd0b97edecf129325b9def07f69818aea05c7d63
8c7f28bc2ed899653bc76171d6785199fd8840cda157d6f4182d0e9283149eb5
56af0b5bc11372e6ba080b0f7d0a3702562b30950aac72b9d16d4e88ea1ba6ee
cbcede8f11cd11a000a3cacdb2f90dad851c5bf2f044c35f39da9ce39923ca7e
576dae5782d7dd98fab606b11b7507be5e7f4b4abedfdc071f21d8d8a4efb789
11ed3d98eb48b3d1f2cb28fec1f3be3623f7fd51e60d133477e53e04a548b999
SH256 hash:
aa2c9cd64d2d506e675fa864f8f76010bc6dfd1594e8d454b94bff59862cbccc
MD5 hash:
23b720754da8e96968b0fb9d94733bec
SHA1 hash:
0cd32c55053f750737050728110ef03601646504
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MALW_emotet
Author:Marc Rivero | McAfee ATR Team
Description:Rule to detect unpacked Emotet

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Heodo

DLL dll aa2c9cd64d2d506e675fa864f8f76010bc6dfd1594e8d454b94bff59862cbccc

(this sample)

  
Delivery method
Distributed via web download

Comments