Analysis

  • max time kernel
    147s
  • max time network
    149s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    01-08-2020 19:35

General

  • Target

    SecuriteInfo.com.Trojan.DownLoader34.14035.15501.25738.exe

  • Size

    220KB

  • MD5

    b63b18d6ff8b58a86622ae424446b598

  • SHA1

    cecb0ae6aa67d216e2f6346d038fb4a0e3d9ad21

  • SHA256

    6bc2425885205290a22d3098a0867a7b0c43d4423cc1b30048fa9448637f1b1f

  • SHA512

    d53798d722df5d9fdf1c42b17b2ea92ac649f70400219dd15ddf57c225c68a4c53378b466b999bf09512b1efef174e667995d0515ddebdb4a1d344488fc3f95c

Score
10/10

Malware Config

Extracted

Family

emotet

C2

24.249.135.121:80

185.94.252.13:443

149.62.173.247:8080

50.28.51.143:8080

80.249.176.206:80

5.196.35.138:7080

190.17.195.202:80

143.0.87.101:80

190.147.137.153:443

181.30.69.50:80

51.255.165.160:8080

190.96.118.251:443

72.47.248.48:7080

178.79.163.131:8080

212.231.60.98:80

187.162.248.237:80

2.47.112.152:80

68.183.190.199:8080

192.241.143.52:8080

77.55.211.77:8080

rsa_pubkey.plain

Signatures

  • Emotet Payload 2 IoCs

    Detects Emotet payload in memory.

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.DownLoader34.14035.15501.25738.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.DownLoader34.14035.15501.25738.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: EnumeratesProcesses
    PID:3820

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3820-0-0x00000000005E0000-0x00000000005EC000-memory.dmp
    Filesize

    48KB