General

  • Target

    9803e94e0526b011e9f776e60bd538c70737b52a568c2b6c1f592482820e02d6

  • Size

    250KB

  • Sample

    200114-kwspap4vva

  • MD5

    f8eccd91f743c79d0266da6e2fae9d59

  • SHA1

    e37183ec1c21732ff4463c15f83c33848075ec75

  • SHA256

    9803e94e0526b011e9f776e60bd538c70737b52a568c2b6c1f592482820e02d6

  • SHA512

    dd8c9c17361ce3685b7ab0ef934bbdf142885743f2a7fcbc62ddbd7ed93f2cb8b238a72702a1b86274f04fe58080fc01145090414d6b3df2dee8df720419be64

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://farsmix.com/wp-admin/xpk881/

exe.dropper

http://thuong.bidiworks.com/wp-content/q2TO1988/

exe.dropper

https://securiteordi.com/wofk253jeksed/QO485/

exe.dropper

http://ziyinshedege.com/wp-content/TIGc/

exe.dropper

http://luilao.com/yakattack/EmXdYs3Rf/

Extracted

Family

emotet

Botnet

Epoch1

C2

70.184.69.146:80

186.177.165.196:443

139.47.135.215:80

192.241.143.52:8080

159.65.241.220:8080

45.79.95.107:443

69.163.33.84:8080

177.34.142.163:80

200.123.183.137:443

2.47.112.72:80

190.17.44.48:80

187.54.225.76:80

190.219.149.236:80

190.100.153.162:443

58.171.38.26:80

91.205.215.57:7080

152.231.89.226:80

94.176.234.118:443

201.213.100.141:8080

203.25.159.3:8080

rsa_pubkey.plain

Targets

    • Target

      9803e94e0526b011e9f776e60bd538c70737b52a568c2b6c1f592482820e02d6

    • Size

      250KB

    • MD5

      f8eccd91f743c79d0266da6e2fae9d59

    • SHA1

      e37183ec1c21732ff4463c15f83c33848075ec75

    • SHA256

      9803e94e0526b011e9f776e60bd538c70737b52a568c2b6c1f592482820e02d6

    • SHA512

      dd8c9c17361ce3685b7ab0ef934bbdf142885743f2a7fcbc62ddbd7ed93f2cb8b238a72702a1b86274f04fe58080fc01145090414d6b3df2dee8df720419be64

    Score
    10/10
    • Emotet

      Emotet is a trojan that is primarily spread through spam emails

    • Process spawned unexpected child process

    • Executes dropped EXE

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks