General

  • Target

    5d043cd7e8d5ba44bdc8b2eb831eaf8b117a63cb81e691de087863f13d14d11b

  • Size

    244KB

  • Sample

    200115-47yb2b6mv2

  • MD5

    84c7db4a8248823b45ad16513875b689

  • SHA1

    50bd3fea65de3443a92e3f7883481ff6829fb9a7

  • SHA256

    5d043cd7e8d5ba44bdc8b2eb831eaf8b117a63cb81e691de087863f13d14d11b

  • SHA512

    706b5ee120935a0d0e375eb8124012afc9a0dbe38cea2cfd7b27a00016ecf5c72d48357e20f9d64e39f4516806c9eebcd35658103dccb2760e42ff3422575fbd

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://www.hgklighting.com/wp-admin/g0bm/

exe.dropper

http://thegioilap.vn/wp-content/EV/

exe.dropper

http://pilkom.ulm.ac.id/wp-content/r4iio/

exe.dropper

http://165.227.220.53/wp-includes/YEQ4r/

exe.dropper

https://jelajahpulautidung.com/t4ierwnn/8j/

Extracted

Family

emotet

Botnet

Epoch2

C2

66.7.242.50:8080

72.186.137.156:80

197.89.27.26:8080

91.250.96.22:8080

37.187.72.193:8080

104.131.44.150:8080

167.71.10.37:8080

78.24.219.147:8080

159.65.25.128:8080

95.128.43.213:8080

179.13.185.19:80

186.86.247.171:443

110.142.38.16:80

201.173.217.124:443

169.239.182.217:8080

211.63.71.72:8080

104.131.11.150:8080

190.55.181.54:443

209.146.22.34:443

64.53.242.181:8080

rsa_pubkey.plain

Targets

    • Target

      5d043cd7e8d5ba44bdc8b2eb831eaf8b117a63cb81e691de087863f13d14d11b

    • Size

      244KB

    • MD5

      84c7db4a8248823b45ad16513875b689

    • SHA1

      50bd3fea65de3443a92e3f7883481ff6829fb9a7

    • SHA256

      5d043cd7e8d5ba44bdc8b2eb831eaf8b117a63cb81e691de087863f13d14d11b

    • SHA512

      706b5ee120935a0d0e375eb8124012afc9a0dbe38cea2cfd7b27a00016ecf5c72d48357e20f9d64e39f4516806c9eebcd35658103dccb2760e42ff3422575fbd

    Score
    10/10
    • Emotet

      Emotet is a trojan that is primarily spread through spam emails

    • Process spawned unexpected child process

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks