General

  • Target

    90ef7ce4aaff0f86f33f847f08c0bc2a66ef409704ddb801b74704c948f544a8.doc

  • Size

    151KB

  • Sample

    200127-3scavpqgzn

  • MD5

    34a2bd9b0ea4b50f26df67aa2dffb3c5

  • SHA1

    96c56055a1745b7fe0c8fbfa976bad7a3df580ee

  • SHA256

    90ef7ce4aaff0f86f33f847f08c0bc2a66ef409704ddb801b74704c948f544a8

  • SHA512

    8e8edd0a5c9fb51b0d31ad542d9011170b8b4d1cc1b57b868ad7c5b092f131576a3168bd094f2913341fb330c06020351e92bebd1ee9bd1e7912e0b0984cae3f

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://delhisexclinic.com/zds/jUzItNFoNN/

exe.dropper

https://lelangg.online/uydlcvg/xoZAiAes/

exe.dropper

https://usispf.org/wp-admin/vjWaya/

exe.dropper

https://www.sexylady.space/wp-admin/JM/

exe.dropper

https://www.metropolnet.gr/cgi-bin/eP1hbutDbo/

Extracted

Family

emotet

Botnet

Epoch1

C2

190.6.193.152:8080

200.69.224.73:80

146.255.96.214:443

74.50.51.115:7080

184.172.27.82:8080

68.183.170.114:8080

45.79.95.107:443

190.210.184.138:995

200.58.83.179:80

113.190.254.245:80

181.29.101.13:8080

185.86.148.222:8080

186.200.205.170:80

139.47.135.215:80

62.75.160.178:8080

190.219.149.236:80

190.210.236.139:80

190.100.153.162:443

91.74.175.46:80

175.139.209.3:8080

rsa_pubkey.plain

Targets

    • Target

      90ef7ce4aaff0f86f33f847f08c0bc2a66ef409704ddb801b74704c948f544a8.doc

    • Size

      151KB

    • MD5

      34a2bd9b0ea4b50f26df67aa2dffb3c5

    • SHA1

      96c56055a1745b7fe0c8fbfa976bad7a3df580ee

    • SHA256

      90ef7ce4aaff0f86f33f847f08c0bc2a66ef409704ddb801b74704c948f544a8

    • SHA512

      8e8edd0a5c9fb51b0d31ad542d9011170b8b4d1cc1b57b868ad7c5b092f131576a3168bd094f2913341fb330c06020351e92bebd1ee9bd1e7912e0b0984cae3f

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails

    • Process spawned unexpected child process

    • Executes dropped EXE

    • Modifies system certificate store

MITRE ATT&CK Enterprise v6

Tasks