General

  • Target

    58284dd1bedbf2c82204eb15cdad07525a70b52ff1729e051ac101c066531ce3

  • Size

    247KB

  • Sample

    200116-xlj5rkpcqx

  • MD5

    292fc1154bbe613521acfa3ab69da24d

  • SHA1

    d89cb8fee32378fab48c4af4073d0b1f4977f2b8

  • SHA256

    58284dd1bedbf2c82204eb15cdad07525a70b52ff1729e051ac101c066531ce3

  • SHA512

    739f5ad0af89e7429e2fe2c67a8579093b1c78b7c85a287e91c2fe46224f334f3f70cea86c9e1ddb6972e4169bd273567c9b40fa3d895173130fb445b0dc58aa

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://zhangpalace.com/wp-admin/kfcuow/

exe.dropper

http://raquelstrutz.edutrovao.com.br/wp-includes/mhj4x/

exe.dropper

http://hoem.staging.pixelcarve.net/content/YLcMZTn/

exe.dropper

https://mdspgrp.com/wp-includes/g6tj/

exe.dropper

http://lula.vm-host.net/wp-content/ewww/wvo4jx/

Extracted

Family

emotet

Botnet

Epoch2

C2

68.172.243.146:80

64.40.250.5:80

81.17.92.70:80

91.250.96.22:8080

37.187.72.193:8080

104.131.44.150:8080

167.71.10.37:8080

37.139.21.175:8080

73.11.153.178:8080

192.241.255.77:8080

91.205.215.66:443

201.229.45.222:8080

46.105.131.87:80

188.0.135.237:80

78.142.114.69:80

64.53.242.181:8080

93.147.141.5:443

101.187.134.207:8080

72.189.57.105:80

190.117.126.169:80

rsa_pubkey.plain

Targets

    • Target

      58284dd1bedbf2c82204eb15cdad07525a70b52ff1729e051ac101c066531ce3

    • Size

      247KB

    • MD5

      292fc1154bbe613521acfa3ab69da24d

    • SHA1

      d89cb8fee32378fab48c4af4073d0b1f4977f2b8

    • SHA256

      58284dd1bedbf2c82204eb15cdad07525a70b52ff1729e051ac101c066531ce3

    • SHA512

      739f5ad0af89e7429e2fe2c67a8579093b1c78b7c85a287e91c2fe46224f334f3f70cea86c9e1ddb6972e4169bd273567c9b40fa3d895173130fb445b0dc58aa

    Score
    10/10
    • Emotet

      Emotet is a trojan that is primarily spread through spam emails

    • Process spawned unexpected child process

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks