General

  • Target

    6173558641d666f3fa423872c42f2fc1acaba79a997382559348c9f1b7740267.doc

  • Size

    151KB

  • Sample

    200127-trxy3zyx7x

  • MD5

    b82cc3db99f0247acfb70b1ddf003eb7

  • SHA1

    570ef6ec637b63d18953c26b30736321da41ad74

  • SHA256

    6173558641d666f3fa423872c42f2fc1acaba79a997382559348c9f1b7740267

  • SHA512

    58a9f7fa0210f4e0f28287da647ed6fe09fc2b3cd81d91de423cd3a1a98ab673d7cf20194d6ab12bf06fb7eabab20b410ed7b1a1f1918fbb6b7d3081f9697d2f

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://delhisexclinic.com/zds/jUzItNFoNN/

exe.dropper

https://lelangg.online/uydlcvg/xoZAiAes/

exe.dropper

https://usispf.org/wp-admin/vjWaya/

exe.dropper

https://www.sexylady.space/wp-admin/JM/

exe.dropper

https://www.metropolnet.gr/cgi-bin/eP1hbutDbo/

Extracted

Family

emotet

Botnet

Epoch1

C2

190.6.193.152:8080

200.69.224.73:80

146.255.96.214:443

74.50.51.115:7080

184.172.27.82:8080

68.183.170.114:8080

45.79.95.107:443

190.210.184.138:995

200.58.83.179:80

113.190.254.245:80

181.29.101.13:8080

185.86.148.222:8080

186.200.205.170:80

139.47.135.215:80

62.75.160.178:8080

190.219.149.236:80

190.210.236.139:80

190.100.153.162:443

91.74.175.46:80

175.139.209.3:8080

rsa_pubkey.plain

Targets

    • Target

      6173558641d666f3fa423872c42f2fc1acaba79a997382559348c9f1b7740267.doc

    • Size

      151KB

    • MD5

      b82cc3db99f0247acfb70b1ddf003eb7

    • SHA1

      570ef6ec637b63d18953c26b30736321da41ad74

    • SHA256

      6173558641d666f3fa423872c42f2fc1acaba79a997382559348c9f1b7740267

    • SHA512

      58a9f7fa0210f4e0f28287da647ed6fe09fc2b3cd81d91de423cd3a1a98ab673d7cf20194d6ab12bf06fb7eabab20b410ed7b1a1f1918fbb6b7d3081f9697d2f

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails

    • Process spawned unexpected child process

    • Executes dropped EXE

    • Modifies system certificate store

MITRE ATT&CK Enterprise v6

Tasks