General

  • Target

    d563d2ca938193a5c92baa0fadbb293f052986310aa3df2d4ead7f249989fdd6

  • Size

    239KB

  • Sample

    200120-ab53w14xns

  • MD5

    ca93dbb175fd36fb6c37df23bcd46b75

  • SHA1

    6e86b98a5531d2001352b1940a5680b50c1794c7

  • SHA256

    d563d2ca938193a5c92baa0fadbb293f052986310aa3df2d4ead7f249989fdd6

  • SHA512

    60956d59b1ce3603237d09422b28d11bc6cdfbb62e94b379fd66c43ec792434a8872d8de83af2a85cf43da114b9ef0b6bd350d7ea4a1f85d007529c90159dd33

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://blog.hasilkan.com/cgi-bin/LxoH/

exe.dropper

http://luatsusaigon.info/libs/zgis/

exe.dropper

https://primalis.com.vn/wp-content/uploads/2020/rxm/

exe.dropper

https://womenhealth.aureliusconferences.com/events/bYIkt2OE/

exe.dropper

https://travelciwidey.com/wp-includes/kaU705/

Extracted

Family

emotet

Botnet

Epoch2

C2

100.6.23.40:80

200.71.200.4:443

190.114.244.182:443

91.250.96.22:8080

37.187.72.193:8080

104.131.44.150:8080

167.71.10.37:8080

110.36.217.66:8080

206.81.10.215:8080

93.147.141.5:443

60.250.78.22:443

92.222.216.44:8080

95.213.236.64:8080

27.109.153.201:8090

66.7.242.50:8080

5.196.74.210:8080

181.143.126.170:80

209.97.168.52:8080

206.189.112.148:8080

64.53.242.181:8080

rsa_pubkey.plain

Targets

    • Target

      d563d2ca938193a5c92baa0fadbb293f052986310aa3df2d4ead7f249989fdd6

    • Size

      239KB

    • MD5

      ca93dbb175fd36fb6c37df23bcd46b75

    • SHA1

      6e86b98a5531d2001352b1940a5680b50c1794c7

    • SHA256

      d563d2ca938193a5c92baa0fadbb293f052986310aa3df2d4ead7f249989fdd6

    • SHA512

      60956d59b1ce3603237d09422b28d11bc6cdfbb62e94b379fd66c43ec792434a8872d8de83af2a85cf43da114b9ef0b6bd350d7ea4a1f85d007529c90159dd33

    Score
    10/10
    • Emotet

      Emotet is a trojan that is primarily spread through spam emails

    • Process spawned unexpected child process

    • Executes dropped EXE

MITRE ATT&CK Enterprise v6

Tasks