General

  • Target

    73500e8951bba463d6eef929f25958bb26bffefc1fb3329dd45e928f3733a122

  • Size

    251KB

  • Sample

    200114-hl39w6rnms

  • MD5

    bfba947cc563cfcae5e93ea75bc4ebe7

  • SHA1

    def6e4fb3e4b1d4cbad49d67bf6dd38ffc9821cd

  • SHA256

    73500e8951bba463d6eef929f25958bb26bffefc1fb3329dd45e928f3733a122

  • SHA512

    22b599c1e7bb5c231ff16bae618af213cc5e2268e561f6e224e87feae9c76d1a3b7e5da6378408afd5c9d2f64b92a40890640171fa0595f9c27fc81f5dacea2f

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://xmdivas.com/a9981b580e0fef550bcb0fd8fadcc02b/eiqgv/

exe.dropper

http://digitaltimbangan.com/cgi-bin/cj8/

exe.dropper

https://sports.tj/wp-includes/p5n5i1d/

exe.dropper

https://work4sales.com/wp-content/rw5N8k08Ed/

exe.dropper

https://rmntnk.ru/omlakdj17fkcjfsd/rxm1/

Extracted

Family

emotet

Botnet

Epoch2

C2

66.7.242.50:8080

72.186.137.156:80

197.89.27.26:8080

91.250.96.22:8080

37.187.72.193:8080

104.131.44.150:8080

167.71.10.37:8080

78.24.219.147:8080

159.65.25.128:8080

95.128.43.213:8080

179.13.185.19:80

186.86.247.171:443

110.142.38.16:80

201.173.217.124:443

169.239.182.217:8080

211.63.71.72:8080

104.131.11.150:8080

190.55.181.54:443

209.146.22.34:443

64.53.242.181:8080

rsa_pubkey.plain

Targets

    • Target

      73500e8951bba463d6eef929f25958bb26bffefc1fb3329dd45e928f3733a122

    • Size

      251KB

    • MD5

      bfba947cc563cfcae5e93ea75bc4ebe7

    • SHA1

      def6e4fb3e4b1d4cbad49d67bf6dd38ffc9821cd

    • SHA256

      73500e8951bba463d6eef929f25958bb26bffefc1fb3329dd45e928f3733a122

    • SHA512

      22b599c1e7bb5c231ff16bae618af213cc5e2268e561f6e224e87feae9c76d1a3b7e5da6378408afd5c9d2f64b92a40890640171fa0595f9c27fc81f5dacea2f

    Score
    10/10
    • Emotet

      Emotet is a trojan that is primarily spread through spam emails

    • Process spawned unexpected child process

    • Executes dropped EXE

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks