General

  • Target

    4c1223741a1939b66319e3972456e7ea3c841c5caa2effb988690337597ee041

  • Size

    252KB

  • Sample

    200114-ak5xxpft66

  • MD5

    f8bc4693b6150736b69a5a3358692d2d

  • SHA1

    454a75035beed882f417bee96e68a7fbccbe60ba

  • SHA256

    4c1223741a1939b66319e3972456e7ea3c841c5caa2effb988690337597ee041

  • SHA512

    0d244e20a32865d9d441429bbd3c1f42ca753c7c75e9ec2bfb82feebcc8e9b4d278bd3bcbcfff4daf4dabad42a262ca44970fe92c40ade4a8209247446735369

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://staging.visionarystream.com/wp-includes/KXst/

exe.dropper

http://bhsleepcenterandspas.com/wp-includes/6Vkd7363/

exe.dropper

http://tzptyz.com/mjgy2/MdHJ7k/

exe.dropper

https://upandatom.biz/credentials/Lcf80251/

exe.dropper

http://cncgate.com/wp-content/uploads/D7/

Extracted

Family

emotet

Botnet

Epoch1

C2

70.184.69.146:80

186.177.165.196:443

139.47.135.215:80

192.241.143.52:8080

159.65.241.220:8080

45.79.95.107:443

69.163.33.84:8080

177.34.142.163:80

200.123.183.137:443

2.47.112.72:80

190.17.44.48:80

187.54.225.76:80

190.219.149.236:80

190.100.153.162:443

58.171.38.26:80

91.205.215.57:7080

152.231.89.226:80

94.176.234.118:443

201.213.100.141:8080

203.25.159.3:8080

rsa_pubkey.plain

Targets

    • Target

      4c1223741a1939b66319e3972456e7ea3c841c5caa2effb988690337597ee041

    • Size

      252KB

    • MD5

      f8bc4693b6150736b69a5a3358692d2d

    • SHA1

      454a75035beed882f417bee96e68a7fbccbe60ba

    • SHA256

      4c1223741a1939b66319e3972456e7ea3c841c5caa2effb988690337597ee041

    • SHA512

      0d244e20a32865d9d441429bbd3c1f42ca753c7c75e9ec2bfb82feebcc8e9b4d278bd3bcbcfff4daf4dabad42a262ca44970fe92c40ade4a8209247446735369

    Score
    10/10
    • Emotet

      Emotet is a trojan that is primarily spread through spam emails

    • Process spawned unexpected child process

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks