General

  • Target

    a021057a2d983bc13e1f6b1516cac0041546aa046e6822c87e09c6c8ba870b1a.doc

  • Size

    153KB

  • Sample

    200128-kc8eyvzzea

  • MD5

    55609774ec4b32d6be9870989725399f

  • SHA1

    4a935129824dc4c95ed19fd7892e5842085095b0

  • SHA256

    a021057a2d983bc13e1f6b1516cac0041546aa046e6822c87e09c6c8ba870b1a

  • SHA512

    a229f8f2db8e60c6d7904bd55b13efe6cbed11f893d1b30002a65ebc7a6489b181a9cdbc75c68e7afbaf4f8890171355bde771c21205674d08779a5526283ff9

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://camnangtrithuc.com/wp-admin/rysO51/

exe.dropper

http://srgasia.com.my/wp-content/vmcG8715/

exe.dropper

https://www.amedspor.com.tr/trsss/2aCO1Gkwg/

exe.dropper

https://uklid.ir/cgi-bin/8v/

exe.dropper

https://bffanmiefan.tk/cgi-bin/wYvv84846/

Extracted

Family

emotet

Botnet

Epoch1

C2

190.6.193.152:8080

200.69.224.73:80

146.255.96.214:443

74.50.51.115:7080

184.172.27.82:8080

68.183.170.114:8080

45.79.95.107:443

190.210.184.138:995

200.58.83.179:80

113.190.254.245:80

181.29.101.13:8080

185.86.148.222:8080

186.200.205.170:80

139.47.135.215:80

62.75.160.178:8080

190.219.149.236:80

190.210.236.139:80

190.100.153.162:443

91.74.175.46:80

175.139.209.3:8080

rsa_pubkey.plain

Targets

    • Target

      a021057a2d983bc13e1f6b1516cac0041546aa046e6822c87e09c6c8ba870b1a.doc

    • Size

      153KB

    • MD5

      55609774ec4b32d6be9870989725399f

    • SHA1

      4a935129824dc4c95ed19fd7892e5842085095b0

    • SHA256

      a021057a2d983bc13e1f6b1516cac0041546aa046e6822c87e09c6c8ba870b1a

    • SHA512

      a229f8f2db8e60c6d7904bd55b13efe6cbed11f893d1b30002a65ebc7a6489b181a9cdbc75c68e7afbaf4f8890171355bde771c21205674d08779a5526283ff9

    Score
    10/10
    • Emotet

      Emotet is a trojan that is primarily spread through spam emails

    • Process spawned unexpected child process

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks