General

  • Target

    029fbd4bb4a45e7ec3edd9e376bc02f8f84dfcc36d077b8da90105f0390eb77a

  • Size

    552KB

  • Sample

    191212-x7s3r9spw2

  • MD5

    b3f96d54a7d3659a91c63a44bbb0b09b

  • SHA1

    28e57b83f63d6a4f4ed0dc3b83ead209ca2d3e43

  • SHA256

    029fbd4bb4a45e7ec3edd9e376bc02f8f84dfcc36d077b8da90105f0390eb77a

  • SHA512

    4a9bdd5c9aeb808363650ccaa30ffffe0bb289418c7f948d7b2e826c79ae07615560ac78022e6b1dd3b933e08112f929d6e6047cf767dfbdfaee944dcc491789

Malware Config

Extracted

Family

emotet

Botnet

Epoch2

C2

110.143.84.202:80

75.80.148.244:80

64.53.242.181:8080

37.59.24.177:8080

66.34.201.20:7080

108.179.206.219:8080

45.56.88.91:443

206.189.112.148:8080

211.63.71.72:8080

178.210.51.222:8080

92.186.52.193:80

195.244.215.206:80

2.38.99.79:80

37.157.194.134:443

206.81.10.215:8080

80.21.182.46:80

80.11.163.139:21

190.56.255.118:80

190.226.44.20:21

173.70.81.77:80

rsa_pubkey.plain

Targets

    • Target

      029fbd4bb4a45e7ec3edd9e376bc02f8f84dfcc36d077b8da90105f0390eb77a

    • Size

      552KB

    • MD5

      b3f96d54a7d3659a91c63a44bbb0b09b

    • SHA1

      28e57b83f63d6a4f4ed0dc3b83ead209ca2d3e43

    • SHA256

      029fbd4bb4a45e7ec3edd9e376bc02f8f84dfcc36d077b8da90105f0390eb77a

    • SHA512

      4a9bdd5c9aeb808363650ccaa30ffffe0bb289418c7f948d7b2e826c79ae07615560ac78022e6b1dd3b933e08112f929d6e6047cf767dfbdfaee944dcc491789

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails

    • Windows security modification

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Disabling Security Tools

1
T1089

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks