MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b777ca4e3c07d59acf57fa180c4d878db1745ae9c78a93228704aa5eadf5a6c8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Emotet (aka Heodo)


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: b777ca4e3c07d59acf57fa180c4d878db1745ae9c78a93228704aa5eadf5a6c8
SHA3-384 hash: d1f4bbd9e0b043697d50f492b260babb2149571ff991a2af18ea768ec4054be5a8756fe449533049baa112481803a948
SHA1 hash: bc72c869accfbb97b213c5ef8c5de400a070b936
MD5 hash: fd07795adccba25223cd6d2886b07636
humanhash: december-delaware-mike-failed
File name:fd07795adccba25223cd6d2886b07636
Download: download sample
Signature Heodo
File size:473'600 bytes
First seen:2021-12-02 07:35:11 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash 057d91f9747659ff50a0558e0aed5a44 (7 x Heodo)
ssdeep 12288:mFyGBDytNZAR5Myju+qQuj/J+7S6Dg8stHb1h:mF92e/jEk7jDg8stJh
Threatray 253 similar samples on MalwareBazaar
TLSH T1FEA4BF20B961C036E4AE10303D68D6EA056F7D364FF0CADB67E42F6D4E352C16B3566A
Reporter zbetcheckin
Tags:32 dll Emotet exe Heodo

Intelligence


File Origin
# of uploads :
1
# of downloads :
102
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Sending a custom TCP request
Launching a process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
67%
Tags:
emotet greyware packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
80 / 100
Signature
C2 URLs / IPs found in malware configuration
Changes security center settings (notifications, updates, antivirus, firewall)
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Multi AV Scanner detection for submitted file
Tries to detect virtualization through RDTSC time measurements
Yara detected Emotet
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 532415 Sample: P5LROPCURK Startdate: 02/12/2021 Architecture: WINDOWS Score: 80 41 210.57.217.132 UNAIR-AS-IDUniversitasAirlanggaID Indonesia 2->41 43 203.114.109.124 TOT-LLI-AS-APTOTPublicCompanyLimitedTH Thailand 2->43 45 27 other IPs or domains 2->45 51 Found malware configuration 2->51 53 Multi AV Scanner detection for submitted file 2->53 55 Yara detected Emotet 2->55 57 C2 URLs / IPs found in malware configuration 2->57 9 loaddll32.exe 1 2->9         started        12 svchost.exe 2->12         started        14 svchost.exe 6 2->14         started        16 4 other processes 2->16 signatures3 process4 signatures5 59 Tries to detect virtualization through RDTSC time measurements 9->59 18 rundll32.exe 2 9->18         started        21 cmd.exe 1 9->21         started        23 rundll32.exe 9->23         started        27 2 other processes 9->27 61 Changes security center settings (notifications, updates, antivirus, firewall) 12->61 25 MpCmdRun.exe 1 12->25         started        process6 signatures7 47 Tries to detect virtualization through RDTSC time measurements 18->47 49 Hides that the sample has been downloaded from the Internet (zone.identifier) 18->49 29 rundll32.exe 18->29         started        31 rundll32.exe 21->31         started        33 rundll32.exe 23->33         started        35 conhost.exe 25->35         started        37 rundll32.exe 27->37         started        process8 process9 39 rundll32.exe 31->39         started       
Threat name:
Win32.Trojan.Emotetcrypt
Status:
Malicious
First seen:
2021-12-02 07:36:13 UTC
File Type:
PE (Dll)
Extracted files:
4
AV detection:
24 of 27 (88.89%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of NtCreateProcessExOtherParentProcess
Unpacked files
SH256 hash:
c8b3aeb41b48ea34ccd04a65ec031da1190a89c040176cfda2ee90d53ccd75e5
MD5 hash:
30300a5c71e8151d86ae9be839083cef
SHA1 hash:
7e7a93a1348559ab9039260f97f4f10be6467724
Detections:
win_emotet_a2 win_emotet_auto
SH256 hash:
b777ca4e3c07d59acf57fa180c4d878db1745ae9c78a93228704aa5eadf5a6c8
MD5 hash:
fd07795adccba25223cd6d2886b07636
SHA1 hash:
bc72c869accfbb97b213c5ef8c5de400a070b936
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Heodo

DLL dll b777ca4e3c07d59acf57fa180c4d878db1745ae9c78a93228704aa5eadf5a6c8

(this sample)

  
Delivery method
Distributed via web download

Comments