MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e350efd69893b28033dfa6ba293f402c04281453c766022a266ae6be6fbe31aa. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Emotet (aka Heodo)


Vendor detections: 3


Intelligence 3 IOCs YARA 4 File information Comments

SHA256 hash: e350efd69893b28033dfa6ba293f402c04281453c766022a266ae6be6fbe31aa
SHA3-384 hash: db238f93a4b76a99d4a37e0a9572047f5bea4ff6ca82f2094031bd5134582ec7335bd2b7a64e632f1f37da4572a69cc0
SHA1 hash: af9f2009ccc0e26f2a4ff32f0c7903cc37d460c6
MD5 hash: f3554f93e653108c6cf12edd54db05ae
humanhash: princess-mike-twelve-hot
File name:e350efd69893b28033dfa6ba293f402c04281453c766022a266ae6be6fbe31aa
Download: download sample
Signature Heodo
File size:79'872 bytes
First seen:2020-03-23 16:26:03 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 01dd93f996c09615db1474b28d83a9ca (1 x Heodo)
ssdeep 1536:GHSpeffJzpa4PKvvMupbRzh7mI565HrVTblQfqA:GHSpefhpa4PKHffw9hTSf
Threatray 52 similar samples on MalwareBazaar
TLSH 9373C0ABBE06058FD4B52AF00DB02F65D51679B18D9626E15B6C8381CFF60C28DD2CDE
Reporter Marco_Ramilli
Tags:Emotet exe Heodo

Intelligence


File Origin
# of uploads :
1
# of downloads :
91
Origin country :
n/a
Vendor Threat Intelligence

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Emotet
Author:JPCERT/CC Incident Response Group
Description:detect Emotet in memory
Reference:internal research
Rule name:Glasses
Author:Seth Hardy
Description:Glasses family
Rule name:GlassesCode
Author:Seth Hardy
Description:Glasses code features
Rule name:win_emotet_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Heodo

Executable exe e350efd69893b28033dfa6ba293f402c04281453c766022a266ae6be6fbe31aa

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
AUTH_APIManipulates User Authorizationauthz.dll::AuthzAddSidsToContext
authz.dll::AuthzFreeAuditEvent
authz.dll::AuthzFreeContext
authz.dll::AuthzFreeResourceManager
authz.dll::AuthzInitializeContextFromSid
advapi32.dll::IsValidSid
SECURITY_BASE_APIUses Security Base APIadvapi32.dll::IsValidAcl
SHELL_APIManipulates System Shellshell32.dll::FindExecutableW
shell32.dll::ShellExecuteW
shell32.dll::SHGetFileInfoA
WIN32_PROCESS_APICan Create Process and Threadskernel32.dll::WriteProcessMemory
WIN_BASE_APIUses Win Base APIkernel32.dll::LoadLibraryExW
WIN_BASE_IO_APICan Create Fileskernel32.dll::MoveFileA
kernel32.dll::GetFileAttributesW
WIN_CRYPT_APIUses Windows Crypt APIadvapi32.dll::CryptSignHashA
WIN_REG_APICan Manipulate Windows Registryadvapi32.dll::RegCreateKeyExW
advapi32.dll::RegReplaceKeyA
advapi32.dll::RegSaveKeyW
advapi32.dll::RegUnLoadKeyA
WIN_USER_APIPerforms GUI Actionsuser32.dll::FindWindowW
user32.dll::CreateWindowExW

Comments