MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b2e580936468414e204e9da4fd5c0b2b5719c3a6af5bb2796d29e061cfa872cc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Emotet (aka Heodo)


Vendor detections: 16


Intelligence 16 IOCs 1 YARA 4 File information Comments

SHA256 hash: b2e580936468414e204e9da4fd5c0b2b5719c3a6af5bb2796d29e061cfa872cc
SHA3-384 hash: 36d66eee2b09563082237de7c9393fc95ec7f37ee4e8e5e0d88c42b00057f4457338deee4a142bb196653bab047a090d
SHA1 hash: ee8717fefe44c90cdd41ff52fd3402a565c3986a
MD5 hash: f4f8bdef1fcc6271e430ac06a14e7fb8
humanhash: five-summer-berlin-burger
File name:f4f8bdef1fcc6271e430ac06a14e7fb8.exe
Download: download sample
Signature Heodo
File size:417'892 bytes
First seen:2024-09-25 16:25:36 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c60c499092f93ea388f8e4d5b9d84aeb (1 x Heodo)
ssdeep 6144:IUqmsjhG9pJ8NU8Z1+3iFLs+4MrQLhElL9nZ0p5Vf0Wuk0d4ohXyulBiJ2EE:LajhG9pJmN4e5LIQZ0fVfMHituz02n
Threatray 69 similar samples on MalwareBazaar
TLSH T14094CF00A7E1C039F5B713F48AB692A8E9297EA16B3580CF62D15BEA67347D0DD31317
TrID 46.6% (.CPL) Windows Control Panel Item (generic) (57583/11/19)
25.2% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
8.5% (.EXE) Win64 Executable (generic) (10523/12/4)
5.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.0% (.EXE) Win16 NE executable (generic) (5038/12/1)
Magika pebin
Reporter abuse_ch
Tags:DBatLoader Emotet exe Heodo Kovter Novter


Avatar
abuse_ch
Heodo C2:
88.253.254.6:80

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
88.253.254.6:80 https://threatfox.abuse.ch/ioc/1329133/

Intelligence


File Origin
# of uploads :
1
# of downloads :
638
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
f4f8bdef1fcc6271e430ac06a14e7fb8.exe
Verdict:
No threats detected
Analysis date:
2024-09-25 16:32:02 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
Encryption Execution Generic Static Stealth Kovter Shellcode Exploit Kovter Tori
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Your mouse was active while VM was running
Сreating synchronization primitives
Launching a process
Using the Windows Management Instrumentation requests
Creating a window
Creating a process with a hidden window
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
epmicrosoft_visual_cc keylogger kovter lolbin microsoft_visual_cc mikey miuref overlay packed setupapi yakes
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
DBatLoader, Kovter, Novter
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
AI detected suspicious sample
Antivirus / Scanner detection for submitted sample
C2 URLs / IPs found in malware configuration
Contains functionality to detect sleep reduction / modifications
Creates processes via WMI
Delayed program exit found
Detected unpacking (changes PE section rights)
Found malware configuration
Found suspicious powershell code related to unpacking or dynamic code loading
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Sigma detected: Suspicious MSHTA Child Process
Suspicious powershell command line found
Yara detected DBatLoader
Yara detected Kovter
Yara detected Novter bot
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1518475 Sample: pAidPh3K8N.exe Startdate: 25/09/2024 Architecture: WINDOWS Score: 100 35 Found malware configuration 2->35 37 Antivirus / Scanner detection for submitted sample 2->37 39 Multi AV Scanner detection for submitted file 2->39 41 7 other signatures 2->41 8 pAidPh3K8N.exe 3 2->8         started        11 svchost.exe 1 1 2->11         started        process3 dnsIp4 43 Detected unpacking (changes PE section rights) 8->43 45 Creates processes via WMI 8->45 47 Delayed program exit found 8->47 49 Contains functionality to detect sleep reduction / modifications 8->49 14 mshta.exe 1 8->14         started        17 WerFault.exe 21 16 8->17         started        20 WerFault.exe 1 16 8->20         started        22 WerFault.exe 2 8->22         started        33 127.0.0.1 unknown unknown 11->33 signatures5 process6 file7 53 Suspicious powershell command line found 14->53 24 powershell.exe 15 14->24         started        29 C:\ProgramData\Microsoft\...\Report.wer, Unicode 17->29 dropped 31 C:\ProgramData\Microsoft\...\Report.wer, Unicode 20->31 dropped signatures8 process9 signatures10 51 Found suspicious powershell code related to unpacking or dynamic code loading 24->51 27 conhost.exe 24->27         started        process11
Threat name:
Win32.Ransomware.Kovter
Status:
Malicious
First seen:
2015-09-22 04:15:40 UTC
File Type:
PE (Exe)
AV detection:
33 of 38 (86.84%)
Threat level:
  5/5
Result
Malware family:
modiloader
Score:
  10/10
Tags:
family:modiloader discovery evasion execution persistence trojan
Behaviour
Modifies Internet Explorer settings
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
System Location Discovery: System Language Discovery
Drops file in System32 directory
Adds Run key to start application
Command and Scripting Interpreter: PowerShell
Maps connected drives based on registry
Checks BIOS information in registry
Deletes itself
Adds policy Run key to start application
Looks for VMWare Tools registry key
Checks for common network interception software
Looks for VirtualBox Guest Additions in registry
Looks for VirtualBox drivers on disk
ModiLoader Second Stage
ModiLoader, DBatLoader
Process spawned unexpected child process
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
50980538f2ed4d3b7b2dd4881993f038e29c1f15adc7d32331cecbb4aa4c574a
MD5 hash:
03414b43e516909c4ca8fd964b2ca5f2
SHA1 hash:
f66be3cbee68e7244d38544a5288c8faf5df85eb
SH256 hash:
4f4523123620c1384fe37c6cfd46b46c8f9eeb4716550227ab849b358b510c50
MD5 hash:
d46f7173d090ebfe2411d1eb87304151
SHA1 hash:
4a5632e9a0bd51c65386e4336c4cd43426037f39
SH256 hash:
5948ac04f91c3bd5851b3294c867d985ebe6717c9b3bfebdfe63e1e565c83fef
MD5 hash:
163db74b1a86e1e3c72dc9a40428ddc9
SHA1 hash:
d42b9092bcf3756a238bbd10330e32455ef10615
SH256 hash:
b2e580936468414e204e9da4fd5c0b2b5719c3a6af5bb2796d29e061cfa872cc
MD5 hash:
f4f8bdef1fcc6271e430ac06a14e7fb8
SHA1 hash:
ee8717fefe44c90cdd41ff52fd3402a565c3986a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Check_OutputDebugStringA_iat
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (GUARD_CF)high
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
AUTH_APIManipulates User AuthorizationADVAPI32.dll::GetAce
USER32.dll::GetUserObjectSecurity
ADVAPI32.dll::InitializeAcl
ADVAPI32.dll::InitializeSecurityDescriptor
USER32.dll::SetUserObjectSecurity
COM_BASE_APICan Download & Execute componentsole32.dll::CoCreateInstance
SECURITY_BASE_APIUses Security Base APIADVAPI32.dll::AddAccessAllowedAceEx
ADVAPI32.dll::AddAce
ADVAPI32.dll::GetAclInformation
ADVAPI32.dll::GetSecurityDescriptorDacl
ADVAPI32.dll::SetSecurityDescriptorDacl
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CloseHandle
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryW
KERNEL32.dll::GetStartupInfoW
KERNEL32.dll::GetCommandLineA
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::WriteConsoleW
KERNEL32.dll::SetStdHandle
KERNEL32.dll::GetConsoleMode
KERNEL32.dll::GetConsoleCP
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateFileW
WIN_USER_APIPerforms GUI ActionsUSER32.dll::OpenClipboard
USER32.dll::CreateWindowExA

Comments