General

  • Target

    8dc7dbd04fd5915a55894aaa51358d9e8d061606cc70a89011628aefb91a8c8d.doc

  • Size

    153KB

  • Sample

    200128-lj6kyyx7ke

  • MD5

    d6c425d8482aa1c32dec0823369f423e

  • SHA1

    fcf6d67e8e20bbe6b69c682b6cf2a7680e8366e5

  • SHA256

    8dc7dbd04fd5915a55894aaa51358d9e8d061606cc70a89011628aefb91a8c8d

  • SHA512

    47b44fec4c49ebde88ffc92b798f16759ec0f178cf38bb15e52fe297a562b2c261a8c23305f34f6fa4c7022b45d7e895599d66811181d3b3438cd9f8561b1810

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://camnangtrithuc.com/wp-admin/rysO51/

exe.dropper

http://srgasia.com.my/wp-content/vmcG8715/

exe.dropper

https://www.amedspor.com.tr/trsss/2aCO1Gkwg/

exe.dropper

https://uklid.ir/cgi-bin/8v/

exe.dropper

https://bffanmiefan.tk/cgi-bin/wYvv84846/

Extracted

Family

emotet

Botnet

Epoch1

C2

190.6.193.152:8080

200.69.224.73:80

146.255.96.214:443

74.50.51.115:7080

184.172.27.82:8080

68.183.170.114:8080

45.79.95.107:443

190.210.184.138:995

200.58.83.179:80

113.190.254.245:80

181.29.101.13:8080

185.86.148.222:8080

186.200.205.170:80

139.47.135.215:80

62.75.160.178:8080

190.219.149.236:80

190.210.236.139:80

190.100.153.162:443

91.74.175.46:80

175.139.209.3:8080

rsa_pubkey.plain

Targets

    • Target

      8dc7dbd04fd5915a55894aaa51358d9e8d061606cc70a89011628aefb91a8c8d.doc

    • Size

      153KB

    • MD5

      d6c425d8482aa1c32dec0823369f423e

    • SHA1

      fcf6d67e8e20bbe6b69c682b6cf2a7680e8366e5

    • SHA256

      8dc7dbd04fd5915a55894aaa51358d9e8d061606cc70a89011628aefb91a8c8d

    • SHA512

      47b44fec4c49ebde88ffc92b798f16759ec0f178cf38bb15e52fe297a562b2c261a8c23305f34f6fa4c7022b45d7e895599d66811181d3b3438cd9f8561b1810

    Score
    10/10
    • Emotet

      Emotet is a trojan that is primarily spread through spam emails

    • Process spawned unexpected child process

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks