General

  • Target

    1d0b57de31383d7eaa7f826998756982034711ada3fd951dae16ca8c338107b2

  • Size

    196KB

  • Sample

    191218-8g4ll5bs3s

  • MD5

    7dac2a66623818161fa64d5a660f0c66

  • SHA1

    32876281fffc66d45fbdbe5de0945898f50de617

  • SHA256

    1d0b57de31383d7eaa7f826998756982034711ada3fd951dae16ca8c338107b2

  • SHA512

    35518500e457c426585577d36652962985d618007bef498e9ff755767a98c4de61d94074d412643e0e8b7aa5e1db23fcb1f0772b3afc7fc4d5dbf2994abff6b3

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://www.meee-designbuild.com/wp-content/vs718/

exe.dropper

https://cardesign-analytics.com/messagelist/wdi9/

exe.dropper

https://www.danytex.com/cgi-bin/c5b2ze315/

exe.dropper

http://nexusfantasy.com/rxmu/eebmh133/

exe.dropper

http://basic.woo-wa.com/lwral/wz87053/

Extracted

Family

emotet

Botnet

Epoch1

C2

63.248.198.8:80

189.19.81.181:443

130.204.247.253:80

96.126.121.64:443

104.236.137.72:8080

85.234.143.94:8080

51.255.165.160:8080

118.36.70.245:80

190.210.184.138:995

188.135.15.49:80

139.162.118.88:8080

72.29.55.174:80

68.183.170.114:8080

181.231.62.54:80

192.241.146.84:8080

71.76.45.83:443

63.246.252.234:80

37.211.49.127:80

74.59.187.94:80

5.88.27.67:8080

rsa_pubkey.plain

Targets

    • Target

      1d0b57de31383d7eaa7f826998756982034711ada3fd951dae16ca8c338107b2

    • Size

      196KB

    • MD5

      7dac2a66623818161fa64d5a660f0c66

    • SHA1

      32876281fffc66d45fbdbe5de0945898f50de617

    • SHA256

      1d0b57de31383d7eaa7f826998756982034711ada3fd951dae16ca8c338107b2

    • SHA512

      35518500e457c426585577d36652962985d618007bef498e9ff755767a98c4de61d94074d412643e0e8b7aa5e1db23fcb1f0772b3afc7fc4d5dbf2994abff6b3

    Score
    10/10
    • Emotet

      Emotet is a trojan that is primarily spread through spam emails

    • Process spawned unexpected child process

    • Executes dropped EXE

MITRE ATT&CK Enterprise v6

Tasks