General

  • Target

    cc13bbfb8a9d2d4484d069fadd7556183386cea842bb534130256187fe61498e.doc

  • Size

    153KB

  • Sample

    200127-tmwbxb9l4s

  • MD5

    4e8c845152422dc8df4a6978175e6c63

  • SHA1

    09cdd596ea999f4be281b346cdd6bead56ab528b

  • SHA256

    cc13bbfb8a9d2d4484d069fadd7556183386cea842bb534130256187fe61498e

  • SHA512

    2d5a37b7cea975baf8e2ddb6c35077c4700791dc3f706b3f37942ca4be597b294e40e1cf9305ee275d494835a2c645eb82cc56a588b57ab7dec5d60291739ada

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://camnangtrithuc.com/wp-admin/rysO51/

exe.dropper

http://srgasia.com.my/wp-content/vmcG8715/

exe.dropper

https://www.amedspor.com.tr/trsss/2aCO1Gkwg/

exe.dropper

https://uklid.ir/cgi-bin/8v/

exe.dropper

https://bffanmiefan.tk/cgi-bin/wYvv84846/

Extracted

Family

emotet

Botnet

Epoch1

C2

190.6.193.152:8080

200.69.224.73:80

146.255.96.214:443

74.50.51.115:7080

184.172.27.82:8080

68.183.170.114:8080

45.79.95.107:443

190.210.184.138:995

200.58.83.179:80

113.190.254.245:80

181.29.101.13:8080

185.86.148.222:8080

186.200.205.170:80

139.47.135.215:80

62.75.160.178:8080

190.219.149.236:80

190.210.236.139:80

190.100.153.162:443

91.74.175.46:80

175.139.209.3:8080

rsa_pubkey.plain

Targets

    • Target

      cc13bbfb8a9d2d4484d069fadd7556183386cea842bb534130256187fe61498e.doc

    • Size

      153KB

    • MD5

      4e8c845152422dc8df4a6978175e6c63

    • SHA1

      09cdd596ea999f4be281b346cdd6bead56ab528b

    • SHA256

      cc13bbfb8a9d2d4484d069fadd7556183386cea842bb534130256187fe61498e

    • SHA512

      2d5a37b7cea975baf8e2ddb6c35077c4700791dc3f706b3f37942ca4be597b294e40e1cf9305ee275d494835a2c645eb82cc56a588b57ab7dec5d60291739ada

    Score
    10/10
    • Emotet

      Emotet is a trojan that is primarily spread through spam emails

    • Process spawned unexpected child process

    • Executes dropped EXE

MITRE ATT&CK Enterprise v6

Tasks