MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e4a7ab7565c4574fe8bafa671c62013dd6fa0d1a276c7f304fb5a1e9aa9a9e55. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Emotet (aka Heodo)


Vendor detections: 11


Intelligence 11 IOCs YARA 5 File information Comments

SHA256 hash: e4a7ab7565c4574fe8bafa671c62013dd6fa0d1a276c7f304fb5a1e9aa9a9e55
SHA3-384 hash: 94f93ff43bb3a067b11c410467562c382f9b2cefdde693caa1fa13edf5da989a4fe13bfd096b5bc0b498c426adf9c89c
SHA1 hash: 79a8452af84081856bd4a0d72bd1cb30547d1b3e
MD5 hash: dcf4e5ce5c909f72a64bf4664da50414
humanhash: ceiling-mississippi-enemy-floor
File name:dcf4e5ce5c909f72a64bf4664da50414
Download: download sample
Signature Heodo
File size:72'192 bytes
First seen:2020-10-25 08:00:31 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 009889c73bd2e55113bf6dfa5f395e0d (65 x Heodo, 1 x Emotet, 1 x PureCrypter)
ssdeep 1536:nQ14LR8spFrd2kxP9GkYsPHmmXZxhDVSQo/l7xmGzFBnO2i8sVJTcWU:Q+8sLd2kJ9GSZjhSz/l7cGhE2iJ3s
Threatray 79 similar samples on MalwareBazaar
TLSH B2639E02930FC06EF693407E7417B9BF41243D386971A5ADFA8B9999B8107E1B1E1F0B
Reporter seifreed
Tags:Emotet Heodo

Intelligence


File Origin
# of uploads :
1
# of downloads :
68
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Creating a service
Launching a service
Creating a file in the Windows subdirectories
Adding an access-denied ACE
Connection attempt
Moving of the original file
Enabling autorun for a service
Connection attempt to an infection source
Result
Threat name:
Detection:
malicious
Classification:
bank.troj.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Changes security center settings (notifications, updates, antivirus, firewall)
Detected Emotet e-Banking trojan
Detected non-DNS traffic on DNS port
Drops executables to the windows directory (C:\Windows) and starts them
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Emotet
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Emotet
Status:
Malicious
First seen:
2020-10-25 08:02:13 UTC
AV detection:
26 of 29 (89.66%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
trojan banker family:emotet
Behaviour
Modifies data under HKEY_USERS
Suspicious behavior: EmotetMutantsSpam
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: RenamesItself
Suspicious use of WriteProcessMemory
Drops file in System32 directory
Emotet
Malware Config
C2 Extraction:
179.12.170.88:8080
182.76.6.2:8080
201.250.11.236:50000
86.98.25.30:53
190.226.44.20:21
198.199.88.162:8080
178.62.37.188:443
92.51.129.249:4143
92.222.125.16:7080
142.44.162.209:8080
92.222.216.44:8080
138.201.140.110:8080
64.13.225.150:8080
186.4.194.153:993
182.176.132.213:8090
37.157.194.134:443
206.189.98.125:8080
45.123.3.54:443
45.33.49.124:443
178.79.161.166:443
104.131.11.150:8080
173.212.203.26:8080
186.4.172.5:8080
88.156.97.210:80
190.145.67.134:8090
144.139.247.220:80
159.65.25.128:8080
103.97.95.218:143
186.4.172.5:443
87.106.136.232:8080
189.209.217.49:80
149.202.153.252:8080
78.24.219.147:8080
125.99.106.226:80
95.128.43.213:8080
47.41.213.2:22
37.208.39.59:7080
185.94.252.13:443
212.71.234.16:8080
87.106.139.101:8080
188.166.253.46:8080
175.100.138.82:22
85.104.59.244:20
62.75.187.192:8080
91.205.215.66:8080
136.243.177.26:8080
190.186.203.55:80
162.243.125.212:8080
91.83.93.103:7080
217.160.182.191:8080
94.205.247.10:80
211.63.71.72:8080
41.220.119.246:80
104.236.246.93:8080
117.197.124.36:443
75.127.14.170:8080
31.12.67.62:7080
169.239.182.217:8080
179.32.19.219:22
177.246.193.139:20
31.172.240.91:8080
152.169.236.172:80
201.212.57.109:80
222.214.218.192:8080
87.230.19.21:8080
190.53.135.159:21
46.105.131.87:80
182.176.106.43:995
Unpacked files
SH256 hash:
e4a7ab7565c4574fe8bafa671c62013dd6fa0d1a276c7f304fb5a1e9aa9a9e55
MD5 hash:
dcf4e5ce5c909f72a64bf4664da50414
SHA1 hash:
79a8452af84081856bd4a0d72bd1cb30547d1b3e
Detections:
win_emotet_a2 win_emotet_auto
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Emotet
Author:JPCERT/CC Incident Response Group
Description:detect Emotet in memory
Reference:internal research
Rule name:MALW_emotet
Author:Marc Rivero | McAfee ATR Team
Description:Rule to detect unpacked Emotet
Rule name:MAL_Emotet_Jan20_1
Author:Florian Roth
Description:Detects Emotet malware
Reference:https://app.any.run/tasks/5e81638e-df2e-4a5b-9e45-b07c38d53929/
Rule name:Win32_Trojan_Emotet
Author:ReversingLabs
Description:Yara rule that detects Emotet trojan.
Rule name:win_emotet_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments