General

  • Target

    17c68efb5139dd5e1cd67aec86fd75f5f22885a5a45b8d6951e999a5967e4a54.doc

  • Size

    235KB

  • Sample

    200214-3apsrmel4e

  • MD5

    b91830b586026b91af49a624d0df0605

  • SHA1

    3bdc4fe304c2c0642ccb0189c34ed20b91a80685

  • SHA256

    17c68efb5139dd5e1cd67aec86fd75f5f22885a5a45b8d6951e999a5967e4a54

  • SHA512

    b0761cc64aa420d24062e1d899b86c84c809445d6b8389264eee31f3cbcc57ba9d6008650bc636791551eabb319cc5c330f514f194221965d5c7366e6cf41fb4

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://ta-behesht.ir/images/Provx00a/

exe.dropper

http://tatcogroup.ir/wp-admin/UC/

exe.dropper

http://tcpartner.ru/wp-includes/nr8/

exe.dropper

http://tepcian.utcc.ac.th/wp-admin/SquR/

exe.dropper

http://ourproductreview.in/pokjbg746ihrtr/a1kzwc/

Extracted

Family

emotet

Botnet

Epoch2

C2

71.126.247.90:80

98.239.119.52:80

80.86.91.91:8080

104.236.28.47:8080

47.155.214.239:443

180.92.239.110:8080

87.106.136.232:8080

76.104.80.47:80

173.16.62.227:80

92.222.216.44:8080

47.153.183.211:80

74.130.83.133:80

47.156.70.145:80

110.36.217.66:8080

160.16.215.66:8080

200.116.145.225:443

181.13.24.82:80

24.94.237.248:80

5.32.55.214:80

31.172.240.91:8080

rsa_pubkey.plain

Targets

    • Target

      17c68efb5139dd5e1cd67aec86fd75f5f22885a5a45b8d6951e999a5967e4a54.doc

    • Size

      235KB

    • MD5

      b91830b586026b91af49a624d0df0605

    • SHA1

      3bdc4fe304c2c0642ccb0189c34ed20b91a80685

    • SHA256

      17c68efb5139dd5e1cd67aec86fd75f5f22885a5a45b8d6951e999a5967e4a54

    • SHA512

      b0761cc64aa420d24062e1d899b86c84c809445d6b8389264eee31f3cbcc57ba9d6008650bc636791551eabb319cc5c330f514f194221965d5c7366e6cf41fb4

    Score
    10/10
    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blacklisted process makes network request

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Matrix

Tasks