General

  • Target

    e433076a8225ccf66fd78a74aaedac45aeff8861f3b00a6b35a8d80695dd912e

  • Size

    203KB

  • Sample

    191220-r186jp4kqs

  • MD5

    e42291ed9ee8378f226bd80d85f12767

  • SHA1

    d823d1db01fe52cd3f5454d122399d669d0e52cc

  • SHA256

    e433076a8225ccf66fd78a74aaedac45aeff8861f3b00a6b35a8d80695dd912e

  • SHA512

    8f2977f622eec3a3db3e410bd6853efff10ca0a80c408f2fa619391fa9ddc9964713a207f4201c534c30740768174523ee255d51b3b9e0bbd608269f1266792d

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://zaferaniyehcenter.com/wp-admin/d3k2c/

exe.dropper

http://newsite.modernformslights.com/wp-content/gj18fr/

exe.dropper

http://dunhuangcaihui.com/feed/wiytu/

exe.dropper

http://blog.kpourkarite.com/et0a/ZnG6LPQDOd/

exe.dropper

https://hellothuoctot.com/wp-content/dw7e9/

Extracted

Family

emotet

Botnet

Epoch2

C2

24.105.202.216:443

24.94.237.248:80

76.164.99.46:80

108.61.99.179:8080

165.227.156.155:443

159.69.89.130:8080

167.99.105.223:7080

87.230.19.21:8080

91.73.197.90:80

210.6.85.121:80

47.156.70.145:80

197.254.221.174:80

58.171.42.66:8080

66.34.201.20:7080

2.38.99.79:80

95.128.43.213:8080

190.12.119.180:443

67.225.179.64:8080

165.228.24.197:80

121.88.5.176:443

rsa_pubkey.plain

Targets

    • Target

      e433076a8225ccf66fd78a74aaedac45aeff8861f3b00a6b35a8d80695dd912e

    • Size

      203KB

    • MD5

      e42291ed9ee8378f226bd80d85f12767

    • SHA1

      d823d1db01fe52cd3f5454d122399d669d0e52cc

    • SHA256

      e433076a8225ccf66fd78a74aaedac45aeff8861f3b00a6b35a8d80695dd912e

    • SHA512

      8f2977f622eec3a3db3e410bd6853efff10ca0a80c408f2fa619391fa9ddc9964713a207f4201c534c30740768174523ee255d51b3b9e0bbd608269f1266792d

    Score
    10/10
    • Emotet

      Emotet is a trojan that is primarily spread through spam emails

    • Process spawned unexpected child process

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks