General

  • Target

    45783453f9f9d89700aba2907c9ed55d23f4bc5f6a22e38598e464589089d000.doc

  • Size

    236KB

  • Sample

    200213-3kd9yezm9a

  • MD5

    d264a46dafe3d59c147b06e008c3b211

  • SHA1

    80b1c7a1ae2cefe876f08daff122ccb722ca8c9b

  • SHA256

    45783453f9f9d89700aba2907c9ed55d23f4bc5f6a22e38598e464589089d000

  • SHA512

    1afc1f51345492fd9587779dfce6a2f8bb35c4d4732d139ba97ba15eb9d1bab750beb3181cdff41147d6482f11618a6a6377239b0d3f022025e9313cbec19efd

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://ta-behesht.ir/images/Provx00a/

exe.dropper

http://tatcogroup.ir/wp-admin/UC/

exe.dropper

http://tcpartner.ru/wp-includes/nr8/

exe.dropper

http://tepcian.utcc.ac.th/wp-admin/SquR/

exe.dropper

http://ourproductreview.in/pokjbg746ihrtr/a1kzwc/

Extracted

Family

emotet

Botnet

Epoch2

C2

71.126.247.90:80

98.239.119.52:80

80.86.91.91:8080

104.236.28.47:8080

47.155.214.239:443

180.92.239.110:8080

87.106.136.232:8080

76.104.80.47:80

173.16.62.227:80

92.222.216.44:8080

47.153.183.211:80

74.130.83.133:80

47.156.70.145:80

110.36.217.66:8080

160.16.215.66:8080

200.116.145.225:443

181.13.24.82:80

24.94.237.248:80

5.32.55.214:80

31.172.240.91:8080

rsa_pubkey.plain

Targets

    • Target

      45783453f9f9d89700aba2907c9ed55d23f4bc5f6a22e38598e464589089d000.doc

    • Size

      236KB

    • MD5

      d264a46dafe3d59c147b06e008c3b211

    • SHA1

      80b1c7a1ae2cefe876f08daff122ccb722ca8c9b

    • SHA256

      45783453f9f9d89700aba2907c9ed55d23f4bc5f6a22e38598e464589089d000

    • SHA512

      1afc1f51345492fd9587779dfce6a2f8bb35c4d4732d139ba97ba15eb9d1bab750beb3181cdff41147d6482f11618a6a6377239b0d3f022025e9313cbec19efd

    Score
    10/10
    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blacklisted process makes network request

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Matrix

Tasks