General

  • Target

    ee6a68655969f365cab1a11da6cc630328b88f132adea746561ca8f6102d5199

  • Size

    246KB

  • Sample

    200116-z79gy35vce

  • MD5

    75882d83fc9d77d08a66dce32d8dd5a3

  • SHA1

    d9a63ba949a5a271040a6f41dbeccb7b86dfaa10

  • SHA256

    ee6a68655969f365cab1a11da6cc630328b88f132adea746561ca8f6102d5199

  • SHA512

    c1af8c45f383873936eb0022f0c2b1386231a78ac259133ab96095ee0c6191e310071bd1dac17b55e049721b688c6a619668d209b13aff185822e57a4fba7a95

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://nfaagro.com/web_map/FF/

exe.dropper

http://blog.arquitetofabiopalheta.com/cgi-bin/vr1tm/

exe.dropper

http://ecrib.e-lyfe.com/21rqvsb/XLkpTvt/

exe.dropper

http://www.moestlstudios.com/error/kx8/

exe.dropper

http://www.loyss.com/wp-content/uploads/fnf8/

Extracted

Family

emotet

Botnet

Epoch2

C2

24.196.49.98:80

93.147.141.5:443

72.189.57.105:80

91.250.96.22:8080

37.187.72.193:8080

104.131.44.150:8080

167.71.10.37:8080

27.109.153.201:8090

105.247.123.133:8080

190.12.119.180:443

120.151.135.224:80

221.165.123.72:80

103.86.49.11:8080

178.237.139.83:8080

5.32.55.214:80

95.213.236.64:8080

189.203.177.41:443

78.24.219.147:8080

190.117.226.104:80

73.11.153.178:8080

rsa_pubkey.plain

Targets

    • Target

      ee6a68655969f365cab1a11da6cc630328b88f132adea746561ca8f6102d5199

    • Size

      246KB

    • MD5

      75882d83fc9d77d08a66dce32d8dd5a3

    • SHA1

      d9a63ba949a5a271040a6f41dbeccb7b86dfaa10

    • SHA256

      ee6a68655969f365cab1a11da6cc630328b88f132adea746561ca8f6102d5199

    • SHA512

      c1af8c45f383873936eb0022f0c2b1386231a78ac259133ab96095ee0c6191e310071bd1dac17b55e049721b688c6a619668d209b13aff185822e57a4fba7a95

    Score
    10/10
    • Emotet

      Emotet is a trojan that is primarily spread through spam emails

    • Process spawned unexpected child process

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks