General

  • Target

    f7b79e7843f3881cf24b8d46e28df46fdcae0905fb83c2b2705508aa5b7901c5

  • Size

    552KB

  • Sample

    191212-ecgzshtch6

  • MD5

    8aaca4e953d1a630fd94f592f2d553dd

  • SHA1

    5f27d3122cd0bb4672e5d52d79062fa3ab35aa39

  • SHA256

    f7b79e7843f3881cf24b8d46e28df46fdcae0905fb83c2b2705508aa5b7901c5

  • SHA512

    fc13e02b93986b6a893ed6705b53a7888277f5d455a997af25c4c7ef97241fdefab52bf18a0eee0b9232500bdc50455b6d1c81631c40e7dbce6e10bc1286d37c

Malware Config

Extracted

Family

emotet

Botnet

Epoch1

C2

91.74.175.46:80

96.38.234.10:80

71.76.45.83:443

96.126.121.64:443

104.236.137.72:8080

85.234.143.94:8080

80.85.87.122:8080

130.45.45.31:80

62.75.143.100:7080

142.93.114.137:8080

79.7.114.1:80

134.209.214.126:8080

68.183.190.199:8080

139.162.118.88:8080

212.71.237.140:8080

46.28.111.142:7080

181.231.62.54:80

200.124.225.32:80

73.167.135.180:80

200.119.11.118:443

rsa_pubkey.plain

Targets

    • Target

      f7b79e7843f3881cf24b8d46e28df46fdcae0905fb83c2b2705508aa5b7901c5

    • Size

      552KB

    • MD5

      8aaca4e953d1a630fd94f592f2d553dd

    • SHA1

      5f27d3122cd0bb4672e5d52d79062fa3ab35aa39

    • SHA256

      f7b79e7843f3881cf24b8d46e28df46fdcae0905fb83c2b2705508aa5b7901c5

    • SHA512

      fc13e02b93986b6a893ed6705b53a7888277f5d455a997af25c4c7ef97241fdefab52bf18a0eee0b9232500bdc50455b6d1c81631c40e7dbce6e10bc1286d37c

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails

    • Windows security modification

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Disabling Security Tools

1
T1089

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks