General

  • Target

    27a83b12572b1a8e36fefb5359f26b51c4da21f1ede18268f3cf499c6a960e05.doc

  • Size

    191KB

  • Sample

    200717-wbwnde6qmj

  • MD5

    bf14d3c4bc02d4188a14290d9b8907b6

  • SHA1

    2565ad56537e4d1ecc7c1bee759254e28d1331a6

  • SHA256

    27a83b12572b1a8e36fefb5359f26b51c4da21f1ede18268f3cf499c6a960e05

  • SHA512

    2ca1210a3e8ad3387b0ec5ae33c9db3a427f2e58a522bdd3ad932f874a675faf12c9532e8f55f3c9f17ace0c69390f33c5bacc53f8bcf6f8bbd0bc0657976a7f

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://fivestarcleanerstx.com/wp-content/mu-plugins/2CLid868/

exe.dropper

https://bhandaraexpress.com/wp-includes/0Iw2jW2/

exe.dropper

http://crm.shaayanpharma.com/application/ffltO/

exe.dropper

http://zazabajouk.com/cf9r4nd/Xsma350581/

exe.dropper

https://e2e-solution.com/sandbox/Sv2880/

Extracted

Family

emotet

Botnet

Epoch1

C2

177.144.135.2:80

104.247.221.104:443

201.213.32.59:80

190.147.137.153:443

178.79.163.131:8080

190.17.195.202:80

212.71.237.140:8080

68.183.190.199:8080

12.162.84.2:8080

186.250.52.226:8080

181.129.96.162:8080

185.94.252.12:80

77.55.211.77:8080

177.72.13.80:80

70.32.115.157:8080

114.109.179.60:80

68.183.170.114:8080

5.196.35.138:7080

87.106.46.107:8080

190.163.1.31:8080

rsa_pubkey.plain

Targets

    • Target

      27a83b12572b1a8e36fefb5359f26b51c4da21f1ede18268f3cf499c6a960e05.doc

    • Size

      191KB

    • MD5

      bf14d3c4bc02d4188a14290d9b8907b6

    • SHA1

      2565ad56537e4d1ecc7c1bee759254e28d1331a6

    • SHA256

      27a83b12572b1a8e36fefb5359f26b51c4da21f1ede18268f3cf499c6a960e05

    • SHA512

      2ca1210a3e8ad3387b0ec5ae33c9db3a427f2e58a522bdd3ad932f874a675faf12c9532e8f55f3c9f17ace0c69390f33c5bacc53f8bcf6f8bbd0bc0657976a7f

    Score
    10/10
    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Emotet Payload

      Detects Emotet payload in memory.

    • Blacklisted process makes network request

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks