General

  • Target

    Docs_12e90e4b70e21ee2e80f2563f43e72ab.html

  • Size

    125KB

  • Sample

    191216-2lrdptpq9e

  • MD5

    12e90e4b70e21ee2e80f2563f43e72ab

  • SHA1

    85d7d298d8543f3dfc91d22225d1e9dad7fb10d4

  • SHA256

    e8d3e9d5d4c9257a079e4140d2a7806854440a260a933a0f46c2d3a1979ecc9b

  • SHA512

    9e7acc9a0030f98388866b1b36bfabffd253701624c85730e201cfe5f957b1807f2fa6cee4a6f131449cec428932b692615d0773b4cf0c472530e3701deb2800

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://sandiegohomevalues.com/engl/4de-kzsyhu-768611/

exe.dropper

https://www.wenkawang.com/data/bofze0s-7ji4-15/

exe.dropper

https://www.bruidsfotograaf-utrecht.com/wp-includes/QLvFLy/

exe.dropper

http://ma.jopedu.com/img/8z8dl-3xn-655019278/

exe.dropper

http://pay.jopedu.com/ThinkPHP/l9okcguh6-b9nnrh7-96245524/

Extracted

Family

emotet

Botnet

Epoch3

C2

108.184.9.44:80

88.247.26.78:80

181.46.176.38:80

164.68.115.146:8080

5.189.148.98:8080

46.105.128.215:8080

69.30.205.162:7080

46.105.131.68:8080

85.235.219.74:80

37.46.129.215:8080

153.190.41.185:80

115.179.91.58:80

100.38.11.243:80

119.57.36.54:8080

124.150.175.129:8080

139.59.12.63:8080

82.146.55.23:7080

123.142.37.165:80

95.216.212.157:8080

200.41.121.69:443

rsa_pubkey.plain

Targets

    • Target

      Docs_12e90e4b70e21ee2e80f2563f43e72ab.html

    • Size

      125KB

    • MD5

      12e90e4b70e21ee2e80f2563f43e72ab

    • SHA1

      85d7d298d8543f3dfc91d22225d1e9dad7fb10d4

    • SHA256

      e8d3e9d5d4c9257a079e4140d2a7806854440a260a933a0f46c2d3a1979ecc9b

    • SHA512

      9e7acc9a0030f98388866b1b36bfabffd253701624c85730e201cfe5f957b1807f2fa6cee4a6f131449cec428932b692615d0773b4cf0c472530e3701deb2800

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails

    • Executes dropped EXE

    • Windows security modification

    • Modifies system certificate store

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks