General

  • Target

    067f7ee3c1948b64a5c7ef7c2e212f6f563506fbfc1884c030a8d25f60ff06c1

  • Size

    253KB

  • Sample

    200117-sshjqkwtpe

  • MD5

    0e6eaa7ed332537e1dbfece4554057b1

  • SHA1

    de6cdfa08a74921ce0fbe29915e9be8cfd979086

  • SHA256

    067f7ee3c1948b64a5c7ef7c2e212f6f563506fbfc1884c030a8d25f60ff06c1

  • SHA512

    80765540a93e43ac34508b1bdaf12db2ed66c1eb82e414f3afb7caa795cc9b7f012c14f7ac926f252502182100d11fa707a47f6d1f7d65400969317e61ca8067

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://okaseo.com/cache/12zl5o-duttqzih2-31839309/

exe.dropper

https://koddata.com/wp-content/VDgENx/

exe.dropper

https://parentingtopsecrets.com/pts/ys8cwojcvc-k1ks0vpkk9-3619095223/

exe.dropper

http://neproperty.in/cgi-bin/hjjz1r5p-5n7mea41-7609513198/

exe.dropper

https://mcuong.000webhostapp.com/wp-admin/aggrp2crnz-nt74vk3f-91560/

Extracted

Family

emotet

Botnet

Epoch3

C2

98.192.74.164:80

59.135.126.129:443

24.70.40.15:8080

178.33.167.120:8080

144.76.56.36:8080

176.58.93.123:80

51.38.134.203:8080

58.92.179.55:443

190.201.144.85:7080

201.183.251.100:80

192.210.217.94:8080

14.161.30.33:443

212.112.113.235:80

23.253.207.142:8080

1.217.126.11:443

61.221.152.140:80

78.189.165.52:8080

149.202.153.251:8080

91.73.169.210:80

212.129.14.27:8080

rsa_pubkey.plain

Targets

    • Target

      067f7ee3c1948b64a5c7ef7c2e212f6f563506fbfc1884c030a8d25f60ff06c1

    • Size

      253KB

    • MD5

      0e6eaa7ed332537e1dbfece4554057b1

    • SHA1

      de6cdfa08a74921ce0fbe29915e9be8cfd979086

    • SHA256

      067f7ee3c1948b64a5c7ef7c2e212f6f563506fbfc1884c030a8d25f60ff06c1

    • SHA512

      80765540a93e43ac34508b1bdaf12db2ed66c1eb82e414f3afb7caa795cc9b7f012c14f7ac926f252502182100d11fa707a47f6d1f7d65400969317e61ca8067

    Score
    10/10
    • Emotet

      Emotet is a trojan that is primarily spread through spam emails

    • Process spawned unexpected child process

    • Executes dropped EXE

MITRE ATT&CK Enterprise v6

Tasks