General

  • Target

    4193cc28bba587d73c8c3e901813a79cfa6fff7a43170f4cd99a6ce7560b1719

  • Size

    286KB

  • Sample

    200122-6vcbsrqw8e

  • MD5

    6938bf332372d0cbddd0749364cf2a0a

  • SHA1

    58a2841f1e1e5748f55a471fe952745b5b624672

  • SHA256

    4193cc28bba587d73c8c3e901813a79cfa6fff7a43170f4cd99a6ce7560b1719

  • SHA512

    b0ade0ac3f75694a74534aa2f977f1dc2fcb58e349492bfeabbce56bc9d16b03c556dfca5a4b11cdf22cb11da11a11a8d10a8d49a53e037f3d23b5a94f99d59f

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://trangvang.info.vn/home/poIc7l/

exe.dropper

https://www.flybuys.net/libraries/xes/

exe.dropper

http://informatic-club.com/language/y/

exe.dropper

http://demo.stickypost.io/wp-admin/g/

exe.dropper

https://www.drivertrainerschool.com.au/logs/RYJPgrKOJ/

Extracted

Family

emotet

Botnet

Epoch2

C2

68.114.229.171:80

74.101.225.121:443

152.168.248.128:443

217.160.19.232:8080

176.9.43.37:8080

5.199.130.105:7080

37.187.72.193:8080

68.172.243.146:80

181.143.126.170:80

108.191.2.72:80

85.152.174.56:80

101.187.197.33:443

121.88.5.176:443

189.203.177.41:443

78.186.5.109:443

66.34.201.20:7080

209.141.54.221:8080

181.126.70.117:80

87.106.136.232:8080

181.13.24.82:80

rsa_pubkey.plain

Targets

    • Target

      4193cc28bba587d73c8c3e901813a79cfa6fff7a43170f4cd99a6ce7560b1719

    • Size

      286KB

    • MD5

      6938bf332372d0cbddd0749364cf2a0a

    • SHA1

      58a2841f1e1e5748f55a471fe952745b5b624672

    • SHA256

      4193cc28bba587d73c8c3e901813a79cfa6fff7a43170f4cd99a6ce7560b1719

    • SHA512

      b0ade0ac3f75694a74534aa2f977f1dc2fcb58e349492bfeabbce56bc9d16b03c556dfca5a4b11cdf22cb11da11a11a8d10a8d49a53e037f3d23b5a94f99d59f

    Score
    10/10
    • Emotet

      Emotet is a trojan that is primarily spread through spam emails

    • Process spawned unexpected child process

    • Executes dropped EXE

MITRE ATT&CK Enterprise v6

Tasks