General

  • Target

    Docs_9d7f3caa367ce2f658699461660b4254.48

  • Size

    70KB

  • Sample

    191209-c5hr3n89gn

  • MD5

    9d7f3caa367ce2f658699461660b4254

  • SHA1

    c72912090de408f923f8175ae915015626ad9d9c

  • SHA256

    918b8d165836e26ba2c38b5ea59b140cd7dd7d41244feedcc11856de22af244d

  • SHA512

    56b0e1b02b5d074e3a82629af659f543776761dc48dc4f2a241f351f102ddc69c7fa04de5e671747b47acceba9bac6b16b41dc6f4b7ae327766d9a083e74826c

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://www.alfalah-ent.com/cms/a7rwpyxb9-k33-1101120868/

exe.dropper

https://raasset.com/x/crHctWU/

exe.dropper

http://alexandrearealty.com/tmp/OyjFYg/

exe.dropper

http://mehuaedxb.com/css/qIkFIs/

exe.dropper

http://mosaiclabel.com/4f9xnykaf/amz4jg4-x3i-459569728/

Extracted

Family

emotet

Botnet

Epoch3

C2

24.27.122.202:80

67.171.182.231:80

190.171.135.235:80

103.9.145.19:8080

46.105.128.215:8080

172.105.213.30:80

69.30.205.162:7080

115.179.91.58:80

181.44.166.242:80

78.46.87.133:8080

81.213.145.45:443

83.156.88.159:80

210.111.160.220:80

195.191.107.67:80

192.241.220.183:8080

1.32.54.12:8080

192.161.190.171:8080

190.189.79.73:80

122.11.164.183:80

41.77.74.214:443

rsa_pubkey.plain

Targets

    • Target

      Docs_9d7f3caa367ce2f658699461660b4254.48

    • Size

      70KB

    • MD5

      9d7f3caa367ce2f658699461660b4254

    • SHA1

      c72912090de408f923f8175ae915015626ad9d9c

    • SHA256

      918b8d165836e26ba2c38b5ea59b140cd7dd7d41244feedcc11856de22af244d

    • SHA512

      56b0e1b02b5d074e3a82629af659f543776761dc48dc4f2a241f351f102ddc69c7fa04de5e671747b47acceba9bac6b16b41dc6f4b7ae327766d9a083e74826c

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails

    • Executes dropped EXE

    • Windows security modification

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks