General

  • Target

    Docs_0198cd350b8be7a6eac9439badbf6ee6.1

  • Size

    183KB

  • Sample

    191220-zvx3r4cedj

  • MD5

    0198cd350b8be7a6eac9439badbf6ee6

  • SHA1

    091e0de839c438ec0d65d035ffdc0d620d8e2e6f

  • SHA256

    07519f4d0537e18fc8ff259b5caaedf93617cc90aefc91a51b8cfd75c656126d

  • SHA512

    1d1233de4e4f98ec2850d6258baa755cb4b60a28b4cef415e4ac5293677a63762f5c5b0911ce798b4169fb876ff49c8a1fb4ffc2cee676161c48c5ea87975d66

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://dejavugroup.com/wp-content/JTjHLbr/

exe.dropper

http://dev7.developmentviewer.com/wp-admin/SYSQOx/

exe.dropper

http://krishna-graphics.com/wp-admin/11x12xd-nobh27two-82927918/

exe.dropper

http://laboratoriosanfrancisco1988.com/9rlkyc/Ccvvezsv/

exe.dropper

http://lanyuewp.com/electrician/ig9eu0g-4q1oml1qc1-749166/

Extracted

Family

emotet

Botnet

Epoch3

C2

98.178.241.106:80

190.171.153.139:80

179.5.118.12:8080

45.79.75.232:8080

124.150.175.133:80

164.68.115.146:8080

5.189.148.98:8080

46.105.128.215:8080

67.254.196.78:443

95.216.207.86:7080

181.46.176.38:80

98.15.140.226:80

217.12.70.226:80

115.179.91.58:80

41.190.148.90:80

162.144.46.90:8080

211.218.105.101:80

212.129.14.27:8080

120.51.83.89:443

200.41.121.69:443

rsa_pubkey.plain

Targets

    • Target

      Docs_0198cd350b8be7a6eac9439badbf6ee6.1

    • Size

      183KB

    • MD5

      0198cd350b8be7a6eac9439badbf6ee6

    • SHA1

      091e0de839c438ec0d65d035ffdc0d620d8e2e6f

    • SHA256

      07519f4d0537e18fc8ff259b5caaedf93617cc90aefc91a51b8cfd75c656126d

    • SHA512

      1d1233de4e4f98ec2850d6258baa755cb4b60a28b4cef415e4ac5293677a63762f5c5b0911ce798b4169fb876ff49c8a1fb4ffc2cee676161c48c5ea87975d66

    Score
    10/10
    • Emotet

      Emotet is a trojan that is primarily spread through spam emails

    • Process spawned unexpected child process

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks