General

  • Target

    3c94acca1bde8af99ecc55d15ffb512d2f2830eb3a6f85839a13d90bf0f92dcc

  • Size

    552KB

  • Sample

    191212-6c2pw8ax5a

  • MD5

    06e2805c1c1f78daf351b1b569a7b41e

  • SHA1

    fcd9454f9cfc1645e510328113bd08752c7171fb

  • SHA256

    3c94acca1bde8af99ecc55d15ffb512d2f2830eb3a6f85839a13d90bf0f92dcc

  • SHA512

    22873c6da44963d919e82874dc361c6440d396a0e54de63f038ef078926dd090908562123861cc5e6cff4569b5c96b2efcf2e9d06f92b26cda06d531d624276d

Malware Config

Extracted

Family

emotet

Botnet

Epoch1

C2

91.74.175.46:80

96.38.234.10:80

71.76.45.83:443

96.126.121.64:443

104.236.137.72:8080

85.234.143.94:8080

80.85.87.122:8080

130.45.45.31:80

62.75.143.100:7080

142.93.114.137:8080

79.7.114.1:80

134.209.214.126:8080

68.183.190.199:8080

139.162.118.88:8080

212.71.237.140:8080

46.28.111.142:7080

181.231.62.54:80

200.124.225.32:80

73.167.135.180:80

200.119.11.118:443

rsa_pubkey.plain

Targets

    • Target

      3c94acca1bde8af99ecc55d15ffb512d2f2830eb3a6f85839a13d90bf0f92dcc

    • Size

      552KB

    • MD5

      06e2805c1c1f78daf351b1b569a7b41e

    • SHA1

      fcd9454f9cfc1645e510328113bd08752c7171fb

    • SHA256

      3c94acca1bde8af99ecc55d15ffb512d2f2830eb3a6f85839a13d90bf0f92dcc

    • SHA512

      22873c6da44963d919e82874dc361c6440d396a0e54de63f038ef078926dd090908562123861cc5e6cff4569b5c96b2efcf2e9d06f92b26cda06d531d624276d

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails

    • Windows security modification

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Disabling Security Tools

1
T1089

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks