General

  • Target

    Docs_b91499c8a863f9698611a20f3a7f9feb.html

  • Size

    167KB

  • Sample

    191212-se1547m69e

  • MD5

    b91499c8a863f9698611a20f3a7f9feb

  • SHA1

    3778b9d12047354709575c2d9e41cee34a629748

  • SHA256

    fae24e9d99c34ca143c6b15c62f0f446f4165124bb90a7d3cd966eea69ce308a

  • SHA512

    161257fda2380c7873e62c7c0c7447b3f89715f7709e6bf8d7bee705f2de0fd0c28557a2885c2bc30d1ccdba30482be6ac30d7c8d83d3aa91827391982d49251

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://acqua.solarcytec.com/rtsbgs/XiWmtYYur/

exe.dropper

https://blog.learncy.net/wp-admin/user/oxZqQp/

exe.dropper

http://hospitalsanrafael.ainimedina.com/wp-includes/vwf-i8ge-4445917/

exe.dropper

https://sg771.kwikfunnels.com/phpmyadmin_bck/x9tfn-lv1h4-174129596/

exe.dropper

http://www.siyinjichangjia.com/wp-content/WYszsP/

Extracted

Family

emotet

Botnet

Epoch3

C2

190.146.14.143:443

85.235.219.74:80

78.187.204.70:80

46.105.128.215:8080

69.30.205.162:7080

192.161.190.171:8080

163.172.97.112:8080

86.98.157.3:80

113.52.135.33:7080

175.127.140.68:80

212.129.14.27:8080

200.41.121.69:443

143.95.101.72:8080

190.161.67.63:80

50.116.78.109:8080

37.46.129.215:8080

119.57.36.54:8080

212.112.113.235:80

46.105.131.68:8080

1.32.54.12:8080

rsa_pubkey.plain

Targets

    • Target

      Docs_b91499c8a863f9698611a20f3a7f9feb.html

    • Size

      167KB

    • MD5

      b91499c8a863f9698611a20f3a7f9feb

    • SHA1

      3778b9d12047354709575c2d9e41cee34a629748

    • SHA256

      fae24e9d99c34ca143c6b15c62f0f446f4165124bb90a7d3cd966eea69ce308a

    • SHA512

      161257fda2380c7873e62c7c0c7447b3f89715f7709e6bf8d7bee705f2de0fd0c28557a2885c2bc30d1ccdba30482be6ac30d7c8d83d3aa91827391982d49251

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails

    • Executes dropped EXE

    • Windows security modification

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Disabling Security Tools

1
T1089

Modify Registry

1
T1112

Discovery

Query Registry

4
T1012

System Information Discovery

3
T1082

Tasks