General

  • Target

    1ce640215c5dfbfe305436b07a2a63072fc67e9e1dc18377d03240397cc8d2d4

  • Size

    203KB

  • Sample

    191225-a3g39c5c7j

  • MD5

    170c6643bc47faf1f4b4d2b178921e81

  • SHA1

    bd27340f7a873e352860e90d3e6eb9df70f9e1f1

  • SHA256

    1ce640215c5dfbfe305436b07a2a63072fc67e9e1dc18377d03240397cc8d2d4

  • SHA512

    0e164bc194d67bfffad1e9009eca73347195ffb94b0f7bcb1c55743524c4cb2c065280bdd437ac976c18f9871c832b26653e746787e10efde0e392c5d61f7e0b

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://joaoleobarbieri.adv.br/test/l4d6638v6l-fotnu5m-867027278/

exe.dropper

http://kaplanforklift.com/web_map/PmTuIEQ/

exe.dropper

http://londontravel.com.ar/brc/HsGpuPR/

exe.dropper

https://leavenworthrental.com/calendar/aoo-ue7-653740/

exe.dropper

http://lareserva.com.py/aloja/AOISroJmq/

Extracted

Family

emotet

Botnet

Epoch3

C2

85.100.122.211:80

78.189.165.52:8080

88.248.140.80:80

45.79.75.232:8080

124.150.175.133:80

164.68.115.146:8080

5.189.148.98:8080

96.234.38.186:8080

178.134.1.238:80

212.129.14.27:8080

78.186.102.195:80

66.229.161.86:443

190.17.94.108:443

91.117.31.181:80

119.57.36.54:8080

37.59.24.25:8080

200.41.121.69:443

217.181.139.237:443

86.70.224.211:80

216.75.37.196:8080

rsa_pubkey.plain

Targets

    • Target

      1ce640215c5dfbfe305436b07a2a63072fc67e9e1dc18377d03240397cc8d2d4

    • Size

      203KB

    • MD5

      170c6643bc47faf1f4b4d2b178921e81

    • SHA1

      bd27340f7a873e352860e90d3e6eb9df70f9e1f1

    • SHA256

      1ce640215c5dfbfe305436b07a2a63072fc67e9e1dc18377d03240397cc8d2d4

    • SHA512

      0e164bc194d67bfffad1e9009eca73347195ffb94b0f7bcb1c55743524c4cb2c065280bdd437ac976c18f9871c832b26653e746787e10efde0e392c5d61f7e0b

    Score
    10/10
    • Emotet

      Emotet is a trojan that is primarily spread through spam emails

    • Process spawned unexpected child process

    • Executes dropped EXE

MITRE ATT&CK Enterprise v6

Tasks