General

  • Target

    08906df7127162808e3e8139bd33e6d7121295a8b3cea0e5c279b989d7e2880f

  • Size

    552KB

  • Sample

    191212-bktvbn828a

  • MD5

    2fe43a830ae2dad46e3e2c2730a54554

  • SHA1

    a522e4dc11563a26af158b65dfd10666c5706bb8

  • SHA256

    08906df7127162808e3e8139bd33e6d7121295a8b3cea0e5c279b989d7e2880f

  • SHA512

    f4aa9dbe4b09b7f6cf1d9c09d53ad1624875056cd4137f8d5e282333c409c4c71742fa1a09a543986ac93648bdd7588442404c8f095ca100796e2dbb674563b2

Malware Config

Extracted

Family

emotet

Botnet

Epoch3

C2

190.146.14.143:443

85.235.219.74:80

78.187.204.70:80

46.105.128.215:8080

69.30.205.162:7080

192.161.190.171:8080

163.172.97.112:8080

86.98.157.3:80

113.52.135.33:7080

175.127.140.68:80

212.129.14.27:8080

200.41.121.69:443

143.95.101.72:8080

190.161.67.63:80

50.116.78.109:8080

37.46.129.215:8080

119.57.36.54:8080

212.112.113.235:80

46.105.131.68:8080

1.32.54.12:8080

rsa_pubkey.plain

Targets

    • Target

      08906df7127162808e3e8139bd33e6d7121295a8b3cea0e5c279b989d7e2880f

    • Size

      552KB

    • MD5

      2fe43a830ae2dad46e3e2c2730a54554

    • SHA1

      a522e4dc11563a26af158b65dfd10666c5706bb8

    • SHA256

      08906df7127162808e3e8139bd33e6d7121295a8b3cea0e5c279b989d7e2880f

    • SHA512

      f4aa9dbe4b09b7f6cf1d9c09d53ad1624875056cd4137f8d5e282333c409c4c71742fa1a09a543986ac93648bdd7588442404c8f095ca100796e2dbb674563b2

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails

    • Windows security modification

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Disabling Security Tools

1
T1089

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks