General

  • Target

    1b96519e0c7b6a1412f163defcbf7949493481d33feeec2de9290dc9c89f7abb.doc

  • Size

    152KB

  • Sample

    200127-a756p9l1lj

  • MD5

    19dfd8d2f27c955d14df1828e97a7bfe

  • SHA1

    c71e055ea15a0ece6ce2ae8f9994a8af663a48cf

  • SHA256

    1b96519e0c7b6a1412f163defcbf7949493481d33feeec2de9290dc9c89f7abb

  • SHA512

    dd31d6b67d7614227450ef85658729bf47a1b84ffbd0a67b66a6c24a27f25936043c2b5f2e288a2a0a83b971ae1a4f39b611f154c06ad37d269400e7d3d57ba0

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://yochina.apps.zeroek.com/assets/GQK9Gly/

exe.dropper

http://www.bandarwinsbobet.com/wp-admin/7bw/

exe.dropper

http://test.pakspaservices.com/wp-content/Yi1j6O7/

exe.dropper

http://portal.meucompromisso.com/wp-admin/kQJ/

exe.dropper

https://wondersofgeorgia.com/wp-admin/jv7hvg/

Extracted

Family

emotet

Botnet

Epoch2

C2

207.177.72.129:8080

23.243.215.4:8080

218.255.173.106:80

136.243.205.112:7080

23.92.16.164:8080

45.55.65.123:8080

217.160.19.232:8080

64.66.6.71:8080

66.34.201.20:7080

85.152.174.56:80

202.175.121.202:8090

87.106.139.101:8080

176.9.43.37:8080

98.156.206.153:80

159.65.25.128:8080

70.184.9.39:8080

209.146.22.34:443

95.213.236.64:8080

98.30.113.161:80

59.103.164.174:80

rsa_pubkey.plain

Targets

    • Target

      1b96519e0c7b6a1412f163defcbf7949493481d33feeec2de9290dc9c89f7abb.doc

    • Size

      152KB

    • MD5

      19dfd8d2f27c955d14df1828e97a7bfe

    • SHA1

      c71e055ea15a0ece6ce2ae8f9994a8af663a48cf

    • SHA256

      1b96519e0c7b6a1412f163defcbf7949493481d33feeec2de9290dc9c89f7abb

    • SHA512

      dd31d6b67d7614227450ef85658729bf47a1b84ffbd0a67b66a6c24a27f25936043c2b5f2e288a2a0a83b971ae1a4f39b611f154c06ad37d269400e7d3d57ba0

    Score
    10/10
    • Emotet

      Emotet is a trojan that is primarily spread through spam emails

    • Process spawned unexpected child process

    • Executes dropped EXE

MITRE ATT&CK Enterprise v6

Tasks