c4479969d5fd10775ce145611010172e406b9626c37b1f7c75f722366711050c

General
Target

c4479969d5fd10775ce145611010172e406b9626c37b1f7c75f722366711050c

Filesize

N/A

Completed

14-01-2020 23:32

Score
10 /10
SHA256

c4479969d5fd10775ce145611010172e406b9626c37b1f7c75f722366711050c

Malware Config

Extracted

Family emotet
C2

66.7.242.50:8080

72.186.137.156:80

197.89.27.26:8080

91.250.96.22:8080

37.187.72.193:8080

104.131.44.150:8080

167.71.10.37:8080

78.24.219.147:8080

159.65.25.128:8080

95.128.43.213:8080

179.13.185.19:80

186.86.247.171:443

110.142.38.16:80

201.173.217.124:443

169.239.182.217:8080

211.63.71.72:8080

104.131.11.150:8080

190.55.181.54:443

209.146.22.34:443

64.53.242.181:8080

190.220.19.82:443

66.34.201.20:7080

27.109.153.201:8090

46.105.131.69:443

110.36.217.66:8080

120.151.135.224:80

73.217.39.73:80

87.230.19.21:8080

47.180.91.213:80

73.11.153.178:8080

45.33.49.124:443

209.141.54.221:8080

121.88.5.176:443

31.31.77.83:443

79.159.249.152:80

178.237.139.83:8080

180.92.239.110:8080

201.229.45.222:8080

173.21.26.90:80

200.116.145.225:443

221.165.123.72:80

217.160.182.191:8080

47.6.15.79:80

60.231.217.199:8080

91.205.215.66:443

182.176.132.213:8090

181.143.126.170:80

70.169.53.234:80

176.106.183.253:8080

92.222.216.44:8080

rsa_pubkey.plain
-----BEGIN PUBLIC KEY----- MHwwDQYJKoZIhvcNAQEBBQADawAwaAJhAKl4M80uy0jcxUiFIaJJyxgHVVnFtCq6 bi6f2xXPh/XUZNyN8UXDe5HzhTc4kwon9MBZffNwFOIc61QfV3K3YzEI/ktcyNqK LS67ONxsVep769QdiVQJXrIaFjMXKz6viwIDAQAB -----END PUBLIC KEY-----
Signatures

Filter: None

    Processes
    Network
    Replay Monitor
    00:00 00:00
    Downloads
    • C:\ProgramData\Microsoft\Crypto\RSA\S-1-5-18\403f0cc78adafaecdb503a6c6424923d_293fa5bd-edfb-4bba-800e-a7dce3ea3438

    • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-634046074-2673730973-2644684987-1000\0f5007522459c86e95ffcc62f32308f1_293fa5bd-edfb-4bba-800e-a7dce3ea3438

    • memory/60-6-0x0000000000600000-0x0000000000617000-memory.dmp

    • memory/60-7-0x0000000000400000-0x000000000046E000-memory.dmp

    • memory/992-4-0x0000000000DE0000-0x0000000000DF7000-memory.dmp

    • memory/4964-0-0x00000000021F0000-0x0000000002207000-memory.dmp

    • memory/4988-2-0x0000000002130000-0x0000000002147000-memory.dmp

    • memory/4988-3-0x0000000000400000-0x000000000046E000-memory.dmp