General

  • Target

    a7ede7de058c6f1b395a688f606a87f2dbebe8856bf2f6f1cd5f8b9465e2873e.doc

  • Size

    195KB

  • Sample

    200718-p1n98v1wpa

  • MD5

    2e3b1ecf591c91f9125c431f5eae27c5

  • SHA1

    4e38b1f4af9e7d448061a6d480fa304c7d37f213

  • SHA256

    a7ede7de058c6f1b395a688f606a87f2dbebe8856bf2f6f1cd5f8b9465e2873e

  • SHA512

    0978f9d1d10f51b619ea330ecb92f6dc40d8cb1c297e0a375d80b7cccf6132a5296348e8aac95b92ff7cfd883b1469db6432e8f7cf0fcd35e85eb506c6fab647

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://aliyousefpoor.com/wp-admin/Gkt8B41139/

exe.dropper

http://www.szhealthshield.com/websiteguide/k82i/

exe.dropper

https://digitalcon7.net/wp-snapshots/0Wn/

exe.dropper

https://exam.ylsbmeirong.com/data/tjEyH973/

exe.dropper

http://abatiy.com/yaa/po0395/

Extracted

Family

emotet

Botnet

Epoch1

C2

177.144.135.2:80

104.247.221.104:443

201.213.32.59:80

190.147.137.153:443

178.79.163.131:8080

190.17.195.202:80

212.71.237.140:8080

68.183.190.199:8080

12.162.84.2:8080

186.250.52.226:8080

181.129.96.162:8080

185.94.252.12:80

77.55.211.77:8080

177.72.13.80:80

70.32.115.157:8080

114.109.179.60:80

68.183.170.114:8080

5.196.35.138:7080

87.106.46.107:8080

190.163.1.31:8080

rsa_pubkey.plain

Targets

    • Target

      a7ede7de058c6f1b395a688f606a87f2dbebe8856bf2f6f1cd5f8b9465e2873e.doc

    • Size

      195KB

    • MD5

      2e3b1ecf591c91f9125c431f5eae27c5

    • SHA1

      4e38b1f4af9e7d448061a6d480fa304c7d37f213

    • SHA256

      a7ede7de058c6f1b395a688f606a87f2dbebe8856bf2f6f1cd5f8b9465e2873e

    • SHA512

      0978f9d1d10f51b619ea330ecb92f6dc40d8cb1c297e0a375d80b7cccf6132a5296348e8aac95b92ff7cfd883b1469db6432e8f7cf0fcd35e85eb506c6fab647

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blacklisted process makes network request

    • Executes dropped EXE

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks