General

  • Target

    5ab974ead53fe2ec317e5f9b30dee0c195014cab15ff7a0fb9024da735d1917b

  • Size

    328KB

  • Sample

    191209-m96h8k52dx

  • MD5

    12c0a4014a99d8ac891b9fc61a0ed83f

  • SHA1

    44f89b97c1e950fb1ad57ac34313622b5c083fda

  • SHA256

    5ab974ead53fe2ec317e5f9b30dee0c195014cab15ff7a0fb9024da735d1917b

  • SHA512

    d5598a7276e49e8c269378cd83d2f82994f0be8d1404371e85a07ef32b6acbb7de94f3299e56337294753cab03e968bb312d6b56fb14d410a1879ff0780a2103

Malware Config

Extracted

Family

emotet

Botnet

Epoch1

C2

76.221.133.146:80

104.33.129.244:80

172.90.70.168:8080

96.126.121.64:443

104.236.137.72:8080

172.104.233.225:8080

85.234.143.94:8080

50.28.51.143:8080

190.186.164.23:80

47.146.42.234:80

63.246.252.234:80

80.29.54.20:80

68.183.190.199:8080

46.28.111.142:7080

183.82.97.25:80

87.106.46.107:8080

188.216.24.204:80

186.68.48.204:443

181.198.203.45:443

88.250.223.190:8080

rsa_pubkey.plain

Targets

    • Target

      5ab974ead53fe2ec317e5f9b30dee0c195014cab15ff7a0fb9024da735d1917b

    • Size

      328KB

    • MD5

      12c0a4014a99d8ac891b9fc61a0ed83f

    • SHA1

      44f89b97c1e950fb1ad57ac34313622b5c083fda

    • SHA256

      5ab974ead53fe2ec317e5f9b30dee0c195014cab15ff7a0fb9024da735d1917b

    • SHA512

      d5598a7276e49e8c269378cd83d2f82994f0be8d1404371e85a07ef32b6acbb7de94f3299e56337294753cab03e968bb312d6b56fb14d410a1879ff0780a2103

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails

    • Windows security modification

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Disabling Security Tools

1
T1089

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks