General

  • Target

    2bd5736f73a8966e4c1fdb9cfc8b1bac911a8b5520c5bde4eab406176eef0fb4.doc

  • Size

    153KB

  • Sample

    200128-taw4tjmxbn

  • MD5

    cc3c4bf51b2706fc3ce182d210aee398

  • SHA1

    4887fa67b33808158d2b4a747039e1fb578914eb

  • SHA256

    2bd5736f73a8966e4c1fdb9cfc8b1bac911a8b5520c5bde4eab406176eef0fb4

  • SHA512

    c04a3792141f2236cd3af58eb8de27fe399f48f357dff1c91780ef026b874ccf3551c6a37d69ead65accdfd0195a0bc3aeabc5f458ac917eecdb2ce89e0decbd

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://camnangtrithuc.com/wp-admin/rysO51/

exe.dropper

http://srgasia.com.my/wp-content/vmcG8715/

exe.dropper

https://www.amedspor.com.tr/trsss/2aCO1Gkwg/

exe.dropper

https://uklid.ir/cgi-bin/8v/

exe.dropper

https://bffanmiefan.tk/cgi-bin/wYvv84846/

Extracted

Family

emotet

Botnet

Epoch1

C2

190.6.193.152:8080

200.69.224.73:80

146.255.96.214:443

74.50.51.115:7080

184.172.27.82:8080

68.183.170.114:8080

45.79.95.107:443

190.210.184.138:995

200.58.83.179:80

113.190.254.245:80

181.29.101.13:8080

185.86.148.222:8080

186.200.205.170:80

139.47.135.215:80

62.75.160.178:8080

190.219.149.236:80

190.210.236.139:80

190.100.153.162:443

91.74.175.46:80

175.139.209.3:8080

rsa_pubkey.plain

Targets

    • Target

      2bd5736f73a8966e4c1fdb9cfc8b1bac911a8b5520c5bde4eab406176eef0fb4.doc

    • Size

      153KB

    • MD5

      cc3c4bf51b2706fc3ce182d210aee398

    • SHA1

      4887fa67b33808158d2b4a747039e1fb578914eb

    • SHA256

      2bd5736f73a8966e4c1fdb9cfc8b1bac911a8b5520c5bde4eab406176eef0fb4

    • SHA512

      c04a3792141f2236cd3af58eb8de27fe399f48f357dff1c91780ef026b874ccf3551c6a37d69ead65accdfd0195a0bc3aeabc5f458ac917eecdb2ce89e0decbd

    Score
    10/10
    • Emotet

      Emotet is a trojan that is primarily spread through spam emails

    • Process spawned unexpected child process

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks