MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ddc2aab868764580cf6603c757574988634eaba928f72a6377f80820ae086118. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Emotet (aka Heodo)


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: ddc2aab868764580cf6603c757574988634eaba928f72a6377f80820ae086118
SHA3-384 hash: 2a6c2bd065a3d24c39075eb74b109da1b1beeed1375b0f3ebc084c9bddbdfe54dc45103538c632ed4b6cb60d676e8df5
SHA1 hash: bddf4f843a61e0fbe4cfd79ce82fa4155b8cf64e
MD5 hash: cc6da3912d50f5509c32bd095f11a7b1
humanhash: summer-paris-river-leopard
File name:emotet_exe_e5_ddc2aab868764580cf6603c757574988634eaba928f72a6377f80820ae086118_2021-12-02__155057.exe
Download: download sample
Signature Heodo
File size:467'456 bytes
First seen:2021-12-02 15:51:03 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash a548354649d911a7faab9c64d4536b5c (8 x Heodo)
ssdeep 6144:uOZ4tFCu2z7E6fg1grz8WwCej/poQAOesHsp6RC6UEMD4e/h8dYdc:uB2fE6fNrwNj/2QLs6M6Fxe6dh
Threatray 734 similar samples on MalwareBazaar
TLSH T120A4BE11B946C032D5AE11343A29E79A5A7D7D321FB085EB67C42F3D0E341D1AB31BAB
Reporter Cryptolaemus1
Tags:dll Emotet epoch5 exe Heodo


Avatar
Cryptolaemus1
Emotet epoch5 exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
156
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a custom TCP request
Launching a process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Emotet
Status:
Malicious
First seen:
2021-12-02 15:52:11 UTC
File Type:
PE (Dll)
Extracted files:
4
AV detection:
25 of 27 (92.59%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of NtCreateProcessExOtherParentProcess
Unpacked files
SH256 hash:
3cb4437b6dbdaed9b6f3a0e071861012158bd1f5674e542899c9f335c472928a
MD5 hash:
f17f6b0fa2d7465f935710d04e5b1b75
SHA1 hash:
3e539bc87cc498e6d994031f3f926626a5e11bf1
Detections:
win_emotet_a2 win_emotet_auto
SH256 hash:
ddc2aab868764580cf6603c757574988634eaba928f72a6377f80820ae086118
MD5 hash:
cc6da3912d50f5509c32bd095f11a7b1
SHA1 hash:
bddf4f843a61e0fbe4cfd79ce82fa4155b8cf64e
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Heodo

DLL dll ddc2aab868764580cf6603c757574988634eaba928f72a6377f80820ae086118

(this sample)

  
Delivery method
Distributed via web download

Comments