MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d048f196a39fc7dae500b057fa000ebbb81ae2e6c18b4ddff445e8d7163f20ab. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Emotet (aka Heodo)


Vendor detections: 11


Intelligence 11 IOCs YARA 1 File information Comments 1

SHA256 hash: d048f196a39fc7dae500b057fa000ebbb81ae2e6c18b4ddff445e8d7163f20ab
SHA3-384 hash: 8f7487c12b8a5d9e61ced86bf0f24213b49ca3ef5c37b86fa962e3f355d1936f048c0eb725694cc3ac92a88769f39eeb
SHA1 hash: 67f31b13485f91be7952b3df5628f14ef1c86a38
MD5 hash: c7e23f2764d6ed9b59b0fed69a4488b0
humanhash: thirteen-fourteen-low-connecticut
File name:c7e23f2764d6ed9b59b0fed69a4488b0
Download: download sample
Signature Heodo
File size:387'072 bytes
First seen:2021-12-01 19:38:28 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash 609402ef170a35cc0e660d7d95ac10ce (74 x Heodo)
ssdeep 6144:zBYrPMTsY8GR3j4fubnY6Zs/Bv6yGM6aSTsfA2qL6jpXNcc6CEteuQJPIgtlpZ5L:yhmT4GbnYks/BJGNWo2LjpScDEteuOIi
Threatray 109 similar samples on MalwareBazaar
TLSH T12F84F103B5C2E6F6D62F04342456D66A6F3E7910072DCEEB9B940DBB4E767C08534A2B
Reporter zbetcheckin
Tags:32 dll Emotet exe Heodo

Intelligence


File Origin
# of uploads :
1
# of downloads :
197
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a custom TCP request
DNS request
Launching a process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
67%
Tags:
anti-debug emotet greyware monero packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
80 / 100
Signature
C2 URLs / IPs found in malware configuration
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Multi AV Scanner detection for submitted file
Sigma detected: Emotet RunDLL32 Process Creation
Yara detected Emotet
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 532221 Sample: 6zAcNlJXo7 Startdate: 01/12/2021 Architecture: WINDOWS Score: 80 39 210.57.217.132 UNAIR-AS-IDUniversitasAirlanggaID Indonesia 2->39 41 203.114.109.124 TOT-LLI-AS-APTOTPublicCompanyLimitedTH Thailand 2->41 43 27 other IPs or domains 2->43 47 Sigma detected: Emotet RunDLL32 Process Creation 2->47 49 Found malware configuration 2->49 51 Multi AV Scanner detection for submitted file 2->51 53 2 other signatures 2->53 9 loaddll32.exe 1 2->9         started        11 svchost.exe 3 8 2->11         started        signatures3 process4 process5 13 rundll32.exe 2 9->13         started        17 cmd.exe 1 9->17         started        19 rundll32.exe 9->19         started        25 3 other processes 9->25 21 WerFault.exe 11->21         started        23 WerFault.exe 11->23         started        dnsIp6 45 192.168.2.1 unknown unknown 13->45 55 Hides that the sample has been downloaded from the Internet (zone.identifier) 13->55 27 rundll32.exe 13->27         started        29 rundll32.exe 17->29         started        31 rundll32.exe 19->31         started        33 rundll32.exe 25->33         started        signatures7 process8 process9 35 rundll32.exe 27->35         started        37 rundll32.exe 29->37         started       
Threat name:
Win32.Trojan.Emotetcrypt
Status:
Malicious
First seen:
2021-12-01 19:39:12 UTC
File Type:
PE (Dll)
AV detection:
23 of 28 (82.14%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:emotet botnet:epoch4 banker suricata trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: RenamesItself
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in System32 directory
Blocklisted process makes network request
Emotet
suricata: ET MALWARE ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Dridex/Trickbot CnC)
suricata: ET MALWARE W32/Emotet CnC Beacon 3
Malware Config
C2 Extraction:
46.55.222.11:443
104.245.52.73:8080
41.76.108.46:8080
103.8.26.103:8080
185.184.25.237:8080
103.8.26.102:8080
203.114.109.124:443
45.118.115.99:8080
178.79.147.66:8080
58.227.42.236:80
45.118.135.203:7080
103.75.201.2:443
195.154.133.20:443
45.142.114.231:8080
212.237.5.209:443
207.38.84.195:8080
104.251.214.46:8080
212.237.17.99:8080
212.237.56.116:7080
216.158.226.206:443
110.232.117.186:8080
158.69.222.101:443
107.182.225.142:8080
176.104.106.96:8080
81.0.236.90:443
50.116.54.215:443
138.185.72.26:8080
51.68.175.8:8080
210.57.217.132:8080
Unpacked files
SH256 hash:
1df283ff994245079e99be828d4cffb301cac75d4ba1844a16bb664e2472a79c
MD5 hash:
4ed73b452418f776038bfea5f2bf3c1b
SHA1 hash:
64898b2a3367837d852559355e45fc7f66933c4c
Detections:
win_emotet_a2 win_emotet_auto
SH256 hash:
d048f196a39fc7dae500b057fa000ebbb81ae2e6c18b4ddff445e8d7163f20ab
MD5 hash:
c7e23f2764d6ed9b59b0fed69a4488b0
SHA1 hash:
67f31b13485f91be7952b3df5628f14ef1c86a38
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Emotet
Author:Dhanunjaya
Description:Yara Rule To Detect Emotet

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Heodo

DLL dll d048f196a39fc7dae500b057fa000ebbb81ae2e6c18b4ddff445e8d7163f20ab

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2021-12-01 19:38:29 UTC

url : hxxps://ascarya.digital/wp-content/ZH4rirU/