General

  • Target

    38a6a545cc47dc2db834a355afd3b5083eb2716baa1676630197ddeb8d61b65e.doc

  • Size

    235KB

  • Sample

    200214-by71be9qrn

  • MD5

    058344b0d496610011c41f78a3124b5e

  • SHA1

    f158b737a852f1a4be4b9a8a135d9bfd45a4f913

  • SHA256

    38a6a545cc47dc2db834a355afd3b5083eb2716baa1676630197ddeb8d61b65e

  • SHA512

    84155d06c5799c1808d03e5f329aa6229c601b33a43065c0d410c5298d23d14e772fba7f594f431f994924bc6e14c89693154bf3bf31d54dcee760b3baeb2797

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://ta-behesht.ir/images/Provx00a/

exe.dropper

http://tatcogroup.ir/wp-admin/UC/

exe.dropper

http://tcpartner.ru/wp-includes/nr8/

exe.dropper

http://tepcian.utcc.ac.th/wp-admin/SquR/

exe.dropper

http://ourproductreview.in/pokjbg746ihrtr/a1kzwc/

Extracted

Family

emotet

Botnet

Epoch2

C2

71.126.247.90:80

98.239.119.52:80

80.86.91.91:8080

104.236.28.47:8080

47.155.214.239:443

180.92.239.110:8080

87.106.136.232:8080

76.104.80.47:80

173.16.62.227:80

92.222.216.44:8080

47.153.183.211:80

74.130.83.133:80

47.156.70.145:80

110.36.217.66:8080

160.16.215.66:8080

200.116.145.225:443

181.13.24.82:80

24.94.237.248:80

5.32.55.214:80

31.172.240.91:8080

rsa_pubkey.plain

Targets

    • Target

      38a6a545cc47dc2db834a355afd3b5083eb2716baa1676630197ddeb8d61b65e.doc

    • Size

      235KB

    • MD5

      058344b0d496610011c41f78a3124b5e

    • SHA1

      f158b737a852f1a4be4b9a8a135d9bfd45a4f913

    • SHA256

      38a6a545cc47dc2db834a355afd3b5083eb2716baa1676630197ddeb8d61b65e

    • SHA512

      84155d06c5799c1808d03e5f329aa6229c601b33a43065c0d410c5298d23d14e772fba7f594f431f994924bc6e14c89693154bf3bf31d54dcee760b3baeb2797

    Score
    10/10
    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blacklisted process makes network request

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Matrix

Tasks