MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b6579b134c1994e01a0d5ee2d056aa2dddde798707b6e4f4414fdcf6f5b0ee02. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Emotet (aka Heodo)


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: b6579b134c1994e01a0d5ee2d056aa2dddde798707b6e4f4414fdcf6f5b0ee02
SHA3-384 hash: 70e236a81e2d04ba9ab4c6f742bd3ec3339db86bfad03b8a3a1607bc36889bf4f8b9f52686bfcfa8d7a401fee55825af
SHA1 hash: 8cc423e819b040ffc59c601c9d133cfc5f11abea
MD5 hash: cfeaf15e152544fcaee0a3988c784fec
humanhash: fix-oxygen-helium-mississippi
File name:emotet_exe_e1_b6579b134c1994e01a0d5ee2d056aa2dddde798707b6e4f4414fdcf6f5b0ee02_2020-12-28__202329.exe
Download: download sample
Signature Heodo
File size:516'608 bytes
First seen:2020-12-28 20:23:34 UTC
Last seen:2020-12-28 21:41:36 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash 0c8e7bcd452798b457f58e9bd0178322 (16 x Heodo)
ssdeep 6144:/FTVPdeCm7WaSN2uDoqjsSr8b55GKY4Tc:/ZddiyaSIupjsH9LY4Tc
Threatray 292 similar samples on MalwareBazaar
TLSH 30B49D21B4C5B039D0EA91766624AB8329BE7D724B6189DB2FF83D0917741C3E735B23
Reporter Cryptolaemus1
Tags:Emotet epoch1 exe Heodo


Avatar
Cryptolaemus1
Emotet epoch1 exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
306
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a UDP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Malware family:
Score:
  10/10
Tags:
family:emotet botnet:epoch1 banker trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Blocklisted process makes network request
Emotet
Malware Config
C2 Extraction:
190.210.246.253:80
31.27.59.105:80
167.71.148.58:443
211.215.18.93:8080
1.234.65.61:80
122.201.23.45:443
190.162.232.138:80
2.80.112.146:80
185.183.16.47:80
181.30.61.163:443
45.16.226.117:443
209.236.123.42:8080
70.32.115.157:8080
45.184.103.73:80
191.182.6.118:80
181.61.182.143:80
110.39.162.2:443
81.215.230.173:443
108.4.209.15:80
188.135.15.49:80
5.196.35.138:7080
187.162.248.237:80
190.136.176.89:80
138.97.60.141:7080
87.106.46.107:8080
118.38.110.192:80
191.241.233.198:80
184.66.18.83:80
181.136.190.86:80
152.169.22.67:80
172.245.248.239:8080
1.226.84.243:8080
137.74.106.111:7080
188.225.32.231:7080
68.183.190.199:8080
104.131.41.185:8080
172.104.169.32:8080
212.71.237.140:8080
80.15.100.37:80
95.76.153.115:80
181.120.29.49:80
177.23.7.151:80
46.101.58.37:8080
213.52.74.198:80
177.144.130.105:8080
110.39.160.38:443
12.162.84.2:8080
35.143.99.174:80
186.146.13.184:443
113.163.216.135:80
94.176.234.118:443
200.24.255.23:80
82.76.111.249:443
81.214.253.80:443
192.175.111.212:7080
202.79.24.136:443
190.64.88.186:443
51.15.7.145:80
190.114.254.163:8080
46.105.114.137:8080
191.53.80.88:80
51.255.165.160:8080
187.39.237.56:8080
192.232.229.53:4143
149.202.72.142:7080
111.67.12.222:8080
81.213.175.132:80
178.250.54.208:8080
168.121.4.238:80
192.232.229.54:7080
201.75.62.86:80
178.211.45.66:8080
155.186.9.160:80
111.67.12.221:8080
138.97.60.140:8080
62.84.75.50:80
70.32.84.74:8080
190.251.216.100:80
85.214.26.7:8080
59.148.253.194:8080
202.187.222.40:80
93.148.247.169:80
190.195.129.227:8090
177.144.130.105:443
197.232.36.108:80
60.93.23.51:80
83.169.21.32:7080
217.13.106.14:8080
202.134.4.210:7080
190.24.243.186:80
77.78.196.173:443
190.45.24.210:80
46.43.2.95:8080
50.28.51.143:8080
185.94.252.27:443
24.232.228.233:80
177.85.167.10:80
187.162.250.23:443
12.163.208.58:80
68.183.170.114:8080
105.209.235.113:8080
191.223.36.170:80
Unpacked files
SH256 hash:
b6579b134c1994e01a0d5ee2d056aa2dddde798707b6e4f4414fdcf6f5b0ee02
MD5 hash:
cfeaf15e152544fcaee0a3988c784fec
SHA1 hash:
8cc423e819b040ffc59c601c9d133cfc5f11abea
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Heodo

DLL dll b6579b134c1994e01a0d5ee2d056aa2dddde798707b6e4f4414fdcf6f5b0ee02

(this sample)

  
Delivery method
Distributed via web download

Comments