General

  • Target

    5560e84be15cbee1d2650beae5cb19cb082942dbeb4a2dd9bb21bf836ca3fa59.doc

  • Size

    151KB

  • Sample

    200127-hzv8heq81e

  • MD5

    017efa563be1f63da113429628fa6ec9

  • SHA1

    31f75494dfbfdba4f66e17f8902b6f80f0e28a1d

  • SHA256

    5560e84be15cbee1d2650beae5cb19cb082942dbeb4a2dd9bb21bf836ca3fa59

  • SHA512

    159da908f70aef00936c833279e5ed87b1e2b817e0fd984956c0810b7fdade44b9a2ba773192e69ae058c4c31c797185f293b50baa2727dda56d9d95862503a8

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://delhisexclinic.com/zds/jUzItNFoNN/

exe.dropper

https://lelangg.online/uydlcvg/xoZAiAes/

exe.dropper

https://usispf.org/wp-admin/vjWaya/

exe.dropper

https://www.sexylady.space/wp-admin/JM/

exe.dropper

https://www.metropolnet.gr/cgi-bin/eP1hbutDbo/

Extracted

Family

emotet

Botnet

Epoch1

C2

190.6.193.152:8080

200.69.224.73:80

146.255.96.214:443

74.50.51.115:7080

184.172.27.82:8080

68.183.170.114:8080

45.79.95.107:443

190.210.184.138:995

200.58.83.179:80

113.190.254.245:80

181.29.101.13:8080

185.86.148.222:8080

186.200.205.170:80

139.47.135.215:80

62.75.160.178:8080

190.219.149.236:80

190.210.236.139:80

190.100.153.162:443

91.74.175.46:80

175.139.209.3:8080

rsa_pubkey.plain

Targets

    • Target

      5560e84be15cbee1d2650beae5cb19cb082942dbeb4a2dd9bb21bf836ca3fa59.doc

    • Size

      151KB

    • MD5

      017efa563be1f63da113429628fa6ec9

    • SHA1

      31f75494dfbfdba4f66e17f8902b6f80f0e28a1d

    • SHA256

      5560e84be15cbee1d2650beae5cb19cb082942dbeb4a2dd9bb21bf836ca3fa59

    • SHA512

      159da908f70aef00936c833279e5ed87b1e2b817e0fd984956c0810b7fdade44b9a2ba773192e69ae058c4c31c797185f293b50baa2727dda56d9d95862503a8

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails

    • Process spawned unexpected child process

    • Executes dropped EXE

    • Modifies system certificate store

MITRE ATT&CK Enterprise v6

Tasks