General

  • Target

    1d0edf1be46e8567cdbcc608cb4556c0fd8af4a1f011a3a249c6d00e6e5ce8b1

  • Size

    298KB

  • Sample

    200121-s7dpvxe9lj

  • MD5

    9dfc3205e571a123279a25e6c95021dc

  • SHA1

    817aa9909e6ca3a4226dfbd75d1fa0090fba9801

  • SHA256

    1d0edf1be46e8567cdbcc608cb4556c0fd8af4a1f011a3a249c6d00e6e5ce8b1

  • SHA512

    cca77a6db10ee58278ea33c9a2873664727e11e979b0fadf2789beb449980e637df0398990dd64c93c565725089c0c18f1eed0f3ba0761dc954791ad51d67ec8

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://hawkeyesss.com/wp-content/r3d3hdjgnc-om4bkcvea-3543/

exe.dropper

http://lookings.in/blog/xGJncTpch/

exe.dropper

http://developer.md-partners.co.jp/UI/doCYRSxq/

exe.dropper

http://e-twow.es/wp-content/dJilYkPOF/

exe.dropper

http://bjenkins.webview.consulting/writer/3r09yemm-0uxjh-3049/

Extracted

Family

emotet

Botnet

Epoch3

C2

81.214.253.80:443

98.15.140.226:80

180.33.71.88:80

178.33.167.120:8080

144.76.56.36:8080

176.58.93.123:80

51.38.134.203:8080

196.6.119.137:80

82.79.244.92:80

175.181.7.188:80

183.87.40.21:8080

201.183.251.100:80

91.73.169.210:80

188.251.213.180:443

110.142.161.90:80

177.144.130.105:443

106.248.79.174:80

70.45.30.28:80

187.72.47.161:443

185.244.167.25:443

rsa_pubkey.plain

Targets

    • Target

      1d0edf1be46e8567cdbcc608cb4556c0fd8af4a1f011a3a249c6d00e6e5ce8b1

    • Size

      298KB

    • MD5

      9dfc3205e571a123279a25e6c95021dc

    • SHA1

      817aa9909e6ca3a4226dfbd75d1fa0090fba9801

    • SHA256

      1d0edf1be46e8567cdbcc608cb4556c0fd8af4a1f011a3a249c6d00e6e5ce8b1

    • SHA512

      cca77a6db10ee58278ea33c9a2873664727e11e979b0fadf2789beb449980e637df0398990dd64c93c565725089c0c18f1eed0f3ba0761dc954791ad51d67ec8

    Score
    10/10
    • Emotet

      Emotet is a trojan that is primarily spread through spam emails

    • Process spawned unexpected child process

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks