MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 bf274f8c9ba0a2e9b51cc341688a1bc827e21e3d52f152bf49380123f70b2a59. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Emotet (aka Heodo)


Vendor detections: 13


Intelligence 13 IOCs YARA 8 File information Comments

SHA256 hash: bf274f8c9ba0a2e9b51cc341688a1bc827e21e3d52f152bf49380123f70b2a59
SHA3-384 hash: af6afbc7264824b4c1325d9d8edf1bcc584170d8f39972a77eff13507fbc19a7aa3144d2bd1fc8efa4f599ae5d724ebb
SHA1 hash: d27bfe2481c74fe0c213456ad3906e96097ab4c6
MD5 hash: 19b0124f2e4f223113bb11a84765a6c3
humanhash: comet-bravo-oscar-tennis
File name:19b0124f2e4f223113bb11a84765a6c3.dll
Download: download sample
Signature Heodo
File size:201'728 bytes
First seen:2023-10-11 11:35:38 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash af052c4725f15ef5f03ed3c21ebd7090 (1 x Heodo)
ssdeep 3072:7zrlNwFBuQ+i2ro9Ux4huw/mY2EeTyDcqsAX8QaCQ5IS39mLSnwKl:7zPkBvoroGIRe+7sAXMCQL3ImwK
Threatray 146 similar samples on MalwareBazaar
TLSH T17A14D0016B91C8BDC48942345C22BA219E7D7C718EF5ACC77F9A179B1AE02C1EB76353
TrID 40.3% (.EXE) Win64 Executable (generic) (10523/12/4)
19.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
17.2% (.EXE) Win32 Executable (generic) (4505/5/1)
7.7% (.EXE) OS/2 Executable (generic) (2029/13)
7.6% (.EXE) Generic Win/DOS Executable (2002/3)
File icon (PE):PE icon
dhash icon 30797131b1b1b1b0 (1 x Heodo)
Reporter ukycircle
Tags:dll Emotet Heodo

Intelligence


File Origin
# of uploads :
1
# of downloads :
409
Origin country :
JP JP
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a custom TCP request
Gathering data
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
n/a
Detection:
malicious
Classification:
evad
Score:
88 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Emotet
Status:
Malicious
First seen:
2021-03-26 06:00:00 UTC
File Type:
PE (Dll)
Extracted files:
7
AV detection:
29 of 38 (76.32%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:emotet botnet:epoch3 banker trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Blocklisted process makes network request
Emotet
Malware Config
C2 Extraction:
125.0.215.60:80
163.53.204.180:443
89.163.210.141:8080
203.157.152.9:7080
157.245.145.87:443
82.78.179.117:443
85.247.144.202:80
37.46.129.215:8080
110.37.224.243:80
192.210.217.94:8080
2.82.75.215:80
69.159.11.38:443
188.166.220.180:7080
103.93.220.182:80
198.20.228.9:8080
91.75.75.46:80
88.247.30.64:80
189.211.214.19:443
203.160.167.243:80
178.33.167.120:8080
178.254.36.182:8080
70.32.89.105:8080
103.80.51.61:8080
54.38.143.245:8080
113.203.238.130:80
50.116.78.109:8080
195.201.56.70:8080
109.99.146.210:8080
75.127.14.170:8080
172.193.14.201:80
203.56.191.129:8080
157.7.164.178:8081
46.32.229.152:8080
78.90.78.210:80
116.202.10.123:8080
189.34.18.252:8080
114.158.126.84:80
201.193.160.196:80
79.133.6.236:8080
202.29.237.113:8080
203.153.216.178:7080
172.96.190.154:8080
74.208.173.91:8080
139.59.61.215:443
117.2.139.117:443
24.230.124.78:80
5.83.32.101:80
139.5.101.203:80
8.4.9.137:8080
120.51.34.254:80
188.226.165.170:8080
91.83.93.103:443
183.91.3.63:80
192.241.220.183:8080
190.18.184.113:80
2.58.16.86:8080
5.79.70.250:8080
113.161.176.235:80
46.105.131.68:8080
223.17.215.76:80
186.146.229.172:80
186.96.170.61:80
121.117.147.153:443
192.163.221.191:8080
139.59.12.63:8080
115.79.195.246:80
172.104.46.84:8080
180.52.66.193:80
185.208.226.142:8080
152.32.75.74:443
143.95.101.72:8080
47.150.238.196:80
201.212.201.127:8080
190.85.46.52:7080
182.73.7.59:8080
178.62.254.156:8080
195.159.28.244:8080
103.229.73.17:8080
103.124.152.221:80
180.148.4.130:8080
60.108.128.186:80
110.172.180.180:8080
162.144.145.58:8080
37.205.9.252:7080
185.142.236.163:443
27.78.27.110:443
58.27.215.3:8080
Unpacked files
SH256 hash:
bf274f8c9ba0a2e9b51cc341688a1bc827e21e3d52f152bf49380123f70b2a59
MD5 hash:
19b0124f2e4f223113bb11a84765a6c3
SHA1 hash:
d27bfe2481c74fe0c213456ad3906e96097ab4c6
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Emotet
Author:kevoreilly
Description:Emotet Payload
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:pe_no_import_table
Author:qux
Description:Detects exe does not have import table
Rule name:Win32_Trojan_Emotet
Author:ReversingLabs
Description:Yara rule that detects Emotet trojan.
Rule name:Windows_Trojan_Emotet_18379a8d
Author:Elastic Security
Rule name:Windows_Trojan_Emotet_1943bbf2
Author:Elastic Security
Rule name:win_emotet_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.emotet.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments