General

  • Target

    ce2cc629db9c9a9b1b1a9d1fcdb941e0ec97b89aee40c8b55764cdfda70bbe3f.doc

  • Size

    153KB

  • Sample

    200128-2zlxanbs7n

  • MD5

    eb49d4a8654577b57bdf8c12c048d4dd

  • SHA1

    dd5c90a8c1ad5f2c23fa6a31d179cef5eb1e3acb

  • SHA256

    ce2cc629db9c9a9b1b1a9d1fcdb941e0ec97b89aee40c8b55764cdfda70bbe3f

  • SHA512

    411f47eaffc8a630b5414fd852e8d825921f16d0ab645ca3438782c35e9c2bbf4459432aa02b8c318083793567dc5711367d7fd00f49c940a4254d2e893fd86b

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://covaihomes.com/cgi-bin/t3ln/

exe.dropper

http://saxseafood.com/wp-content/VHTlLciKX/

exe.dropper

https://zaamira.com/wp-admin/2sof7o/

exe.dropper

https://shopify-ed.apps.zeroek.com/dist/hxrf9/

exe.dropper

https://sophistproduction.com/wp-includes/Wijy9/

Extracted

Family

emotet

Botnet

Epoch2

C2

207.177.72.129:8080

23.243.215.4:8080

218.255.173.106:80

136.243.205.112:7080

23.92.16.164:8080

45.55.65.123:8080

217.160.19.232:8080

64.66.6.71:8080

66.34.201.20:7080

85.152.174.56:80

202.175.121.202:8090

87.106.139.101:8080

176.9.43.37:8080

98.156.206.153:80

159.65.25.128:8080

70.184.9.39:8080

209.146.22.34:443

95.213.236.64:8080

98.30.113.161:80

59.103.164.174:80

rsa_pubkey.plain

Targets

    • Target

      ce2cc629db9c9a9b1b1a9d1fcdb941e0ec97b89aee40c8b55764cdfda70bbe3f.doc

    • Size

      153KB

    • MD5

      eb49d4a8654577b57bdf8c12c048d4dd

    • SHA1

      dd5c90a8c1ad5f2c23fa6a31d179cef5eb1e3acb

    • SHA256

      ce2cc629db9c9a9b1b1a9d1fcdb941e0ec97b89aee40c8b55764cdfda70bbe3f

    • SHA512

      411f47eaffc8a630b5414fd852e8d825921f16d0ab645ca3438782c35e9c2bbf4459432aa02b8c318083793567dc5711367d7fd00f49c940a4254d2e893fd86b

    Score
    10/10
    • Emotet

      Emotet is a trojan that is primarily spread through spam emails

    • Process spawned unexpected child process

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks