General

  • Target

    a1baf5a0d42e54e55ca8951b6c1a58a9dce4268a95a768b7474c6f4a59e5e84b

  • Size

    250KB

  • Sample

    200114-2bxdthw76s

  • MD5

    34c0a4e6524130a943dbae6af45836e2

  • SHA1

    ab83a268bfb436545ec90102403e8a96957f7b76

  • SHA256

    a1baf5a0d42e54e55ca8951b6c1a58a9dce4268a95a768b7474c6f4a59e5e84b

  • SHA512

    6fcd90fd7bf8951ba337feaff775446bee3ec73c33e0698ba21f66f541ccfd0c75a5388f6b22a4306a5036ff83f5f06bf8e2fc69a7c89cf954684fe1077d874d

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://xmdivas.com/a9981b580e0fef550bcb0fd8fadcc02b/eiqgv/

exe.dropper

http://digitaltimbangan.com/cgi-bin/cj8/

exe.dropper

https://sports.tj/wp-includes/p5n5i1d/

exe.dropper

https://work4sales.com/wp-content/rw5N8k08Ed/

exe.dropper

https://rmntnk.ru/omlakdj17fkcjfsd/rxm1/

Extracted

Family

emotet

Botnet

Epoch2

C2

66.7.242.50:8080

72.186.137.156:80

197.89.27.26:8080

91.250.96.22:8080

37.187.72.193:8080

104.131.44.150:8080

167.71.10.37:8080

78.24.219.147:8080

159.65.25.128:8080

95.128.43.213:8080

179.13.185.19:80

186.86.247.171:443

110.142.38.16:80

201.173.217.124:443

169.239.182.217:8080

211.63.71.72:8080

104.131.11.150:8080

190.55.181.54:443

209.146.22.34:443

64.53.242.181:8080

rsa_pubkey.plain

Targets

    • Target

      a1baf5a0d42e54e55ca8951b6c1a58a9dce4268a95a768b7474c6f4a59e5e84b

    • Size

      250KB

    • MD5

      34c0a4e6524130a943dbae6af45836e2

    • SHA1

      ab83a268bfb436545ec90102403e8a96957f7b76

    • SHA256

      a1baf5a0d42e54e55ca8951b6c1a58a9dce4268a95a768b7474c6f4a59e5e84b

    • SHA512

      6fcd90fd7bf8951ba337feaff775446bee3ec73c33e0698ba21f66f541ccfd0c75a5388f6b22a4306a5036ff83f5f06bf8e2fc69a7c89cf954684fe1077d874d

    Score
    10/10
    • Emotet

      Emotet is a trojan that is primarily spread through spam emails

    • Process spawned unexpected child process

    • Executes dropped EXE

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks