MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b85e7cf333acc93e74b38cb5158aa947359feb1df04a4f27f5569a740689a895. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Emotet (aka Heodo)


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: b85e7cf333acc93e74b38cb5158aa947359feb1df04a4f27f5569a740689a895
SHA3-384 hash: f1259d0ac1c413b4c1f16d7d142f2175d014d1959733006aca9b1b1b3ab2290ca69d8ce1d125358b50765cdc45e70910
SHA1 hash: 6196f76462244d34d32904da8fd451e8ad5040eb
MD5 hash: 566ce1cd261f69ad67efda6de64a1bd9
humanhash: alabama-mobile-missouri-zulu
File name:hbqen.dll
Download: download sample
Signature Heodo
File size:676'352 bytes
First seen:2022-11-02 07:54:16 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 6e8babed9b0b941a34aa7c12e96745c0 (38 x Heodo)
ssdeep 12288:H6NFi+qz19gtAgY2tiZl4S/aukg78I8v4lSRi4gu2CTRD:aNY19gigZtiZydukmQAlQEG
Threatray 6'449 similar samples on MalwareBazaar
TLSH T1B0E48C82F6AC84B0D06BD13DC9A34B45EA713C988B3597CB5394EB2A2F337D55939321
TrID 37.7% (.SCR) Windows screen saver (13101/52/3)
30.3% (.EXE) Win64 Executable (generic) (10523/12/4)
14.5% (.EXE) Win16 NE executable (generic) (5038/12/1)
5.8% (.EXE) OS/2 Executable (generic) (2029/13)
5.7% (.EXE) Generic Win/DOS Executable (2002/3)
File icon (PE):PE icon
dhash icon 71b119dcce576333 (3'570 x Heodo, 203 x TrickBot, 19 x Gh0stRAT)
Reporter matcha_shake
Tags:Emotet exe Heodo

Intelligence


File Origin
# of uploads :
1
# of downloads :
241
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
hbqen.dll
Verdict:
No threats detected
Analysis date:
2022-11-02 07:56:22 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Launching a process
Sending a custom TCP request
Moving of the original file
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Result
Malware family:
n/a
Score:
  10/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckScreenResolution
CursorPosition
MeasuringTime
SystemUptime
EvasionQueryPerformanceCounter
CheckCmdLine
EvasionGetTickCount
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware keylogger packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Malware family:
Score:
  10/10
Tags:
family:emotet banker persistence trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: RenamesItself
Suspicious use of WriteProcessMemory
Adds Run key to start application
Emotet
Verdict:
Informative
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
b85e7cf333acc93e74b38cb5158aa947359feb1df04a4f27f5569a740689a895
MD5 hash:
566ce1cd261f69ad67efda6de64a1bd9
SHA1 hash:
6196f76462244d34d32904da8fd451e8ad5040eb
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments