MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cf97f520288b9f20c12beed327fd302a9501fef8125558ca624979f9ed853bc0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Emotet (aka Heodo)


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: cf97f520288b9f20c12beed327fd302a9501fef8125558ca624979f9ed853bc0
SHA3-384 hash: 0aac28a3a7034767e6ebc3d2353fb768d4e55a3d6098d27bb9d49bee8df41269c8c9b9a425b5b110333a6ade1a9f4323
SHA1 hash: 13a294f2e55effcc19d94a2f656254ec346d304a
MD5 hash: 322ab0a131bf23957522cee0081ce7d6
humanhash: monkey-blossom-five-east
File name:b91c8fea163423257c932a273555468f
Download: download sample
Signature Heodo
File size:270'403 bytes
First seen:2022-06-08 12:45:40 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 963f2e88a5b03877d0583808b2526c1c (38 x Heodo)
ssdeep 3072:7R7Ce82w+Oh+UjuFJrfr7CS/FmikytkqroMdjaWtHCqPZ4PEx2ES2vZg3f4L5ZJi:7lFJuk4uFxOmFwytLVxDtfPZ4PE2sPs5
Threatray 2'565 similar samples on MalwareBazaar
TLSH T19844C089ABE1ADDBD51407798DD6D324333EF2814B8387076B2598390F23BA4BFC5A45
TrID 43.3% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
27.5% (.EXE) Win64 Executable (generic) (10523/12/4)
13.2% (.EXE) Win16 NE executable (generic) (5038/12/1)
5.3% (.EXE) OS/2 Executable (generic) (2029/13)
5.2% (.EXE) Generic Win/DOS Executable (2002/3)
Reporter JAMESWT_WT
Tags:Emotet exe Heodo

Intelligence


File Origin
# of uploads :
1
# of downloads :
259
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Invio documento rif.88794627 del 08.06.2022.xls
Verdict:
Malicious activity
Analysis date:
2022-06-08 12:44:18 UTC
Tags:
macros loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Creating a service
Launching a process
Sending a custom TCP request
Moving of the original file
Enabling autorun for a service
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
anti-debug overlay packed spyeye
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win64.Trojan.Emotet
Status:
Malicious
First seen:
2022-06-08 12:46:08 UTC
File Type:
PE+ (Dll)
AV detection:
21 of 26 (80.77%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:emotet botnet:epoch4 banker suricata trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: RenamesItself
Suspicious use of WriteProcessMemory
Emotet
suricata: ET MALWARE W32/Emotet CnC Beacon 3
Malware Config
C2 Extraction:
94.23.45.86:4143
129.232.188.93:443
213.241.20.155:443
197.242.150.244:8080
172.104.251.154:8080
46.55.222.11:443
82.223.21.224:8080
5.9.116.246:8080
1.234.2.232:8080
146.59.226.45:443
160.16.142.56:8080
115.68.227.76:8080
72.15.201.15:8080
188.44.20.25:443
185.4.135.165:8080
103.132.242.26:8080
173.212.193.249:8080
163.44.196.120:8080
183.111.227.137:8080
149.56.131.28:8080
212.24.98.99:8080
159.65.140.115:443
150.95.66.124:8080
107.170.39.149:8080
203.114.109.124:443
41.73.252.195:443
37.187.115.122:8080
82.165.152.127:8080
119.193.124.41:7080
103.75.201.2:443
79.137.35.198:8080
159.65.88.10:8080
209.126.98.206:8080
167.172.253.162:8080
186.194.240.217:443
51.254.140.238:7080
51.91.76.89:8080
153.126.146.25:7080
207.180.241.186:8080
206.189.28.199:8080
45.176.232.124:443
103.70.28.102:8080
158.69.222.101:443
151.106.112.196:8080
103.43.75.120:443
91.207.28.33:8080
159.89.202.34:443
45.186.16.18:443
45.235.8.30:8080
201.94.166.162:443
164.68.99.3:8080
110.232.117.186:8080
45.118.115.99:8080
207.148.79.14:8080
131.100.24.231:80
31.22.4.160:8080
134.122.66.193:8080
196.218.30.83:443
209.97.163.214:443
1.234.21.73:7080
101.50.0.91:8080
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Heodo

Executable exe cf97f520288b9f20c12beed327fd302a9501fef8125558ca624979f9ed853bc0

(this sample)

  
Delivery method
Distributed via web download

Comments