General

  • Target

    emotet_e2_24c7551200e919fc0bdce151aef784c0c324c81a337a8bf70e67cfebf1abae0d_2020-09-17__131708._doc

  • Size

    172KB

  • Sample

    200917-92pdp4ds1s

  • MD5

    af5701e6c5f9bd86f09a46875323fbfc

  • SHA1

    02429e66570b6b347c3357c559d27e5211f11eb1

  • SHA256

    24c7551200e919fc0bdce151aef784c0c324c81a337a8bf70e67cfebf1abae0d

  • SHA512

    b73d3296ce25058d7b6f2560cb66af5bd066c11ed46570d82106aaf1c08ccdfbce8adfd322008ddfacb968254372f277d2aa1ea7459399dda687c0a85a030c64

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://rhyton-building.com/wp-admin/Ey8qV0/

exe.dropper

http://ezzll.com/wp-includes/KIU2WU/

exe.dropper

http://tellmetech.com/wp-content/4ka/

exe.dropper

https://elmundodelareposteria.com/wp-admin/0PVVmJm/

exe.dropper

https://manuelrozas.cl/assets/XWN/

exe.dropper

https://haritdharni.com/wp-admin/bZM/

exe.dropper

https://theworks-group.com/site/pQT6j5/

Extracted

Family

emotet

Botnet

Epoch2

C2

74.219.172.26:80

134.209.36.254:8080

104.156.59.7:8080

120.138.30.150:8080

194.187.133.160:443

104.236.246.93:8080

74.208.45.104:8080

78.187.156.31:80

187.161.206.24:80

94.23.216.33:80

172.91.208.86:80

91.211.88.52:7080

50.91.114.38:80

200.123.150.89:443

121.124.124.40:7080

62.75.141.82:80

5.196.74.210:8080

24.137.76.62:80

85.105.205.77:8080

139.130.242.43:80

rsa_pubkey.plain

Targets

    • Target

      emotet_e2_24c7551200e919fc0bdce151aef784c0c324c81a337a8bf70e67cfebf1abae0d_2020-09-17__131708._doc

    • Size

      172KB

    • MD5

      af5701e6c5f9bd86f09a46875323fbfc

    • SHA1

      02429e66570b6b347c3357c559d27e5211f11eb1

    • SHA256

      24c7551200e919fc0bdce151aef784c0c324c81a337a8bf70e67cfebf1abae0d

    • SHA512

      b73d3296ce25058d7b6f2560cb66af5bd066c11ed46570d82106aaf1c08ccdfbce8adfd322008ddfacb968254372f277d2aa1ea7459399dda687c0a85a030c64

    Score
    10/10
    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Emotet Payload

      Detects Emotet payload in memory.

    • Blacklisted process makes network request

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Matrix

Collection

    Command and Control

      Credential Access

        Defense Evasion

          Execution

            Exfiltration

              Impact

                Initial Access

                  Lateral Movement

                    Persistence

                      Privilege Escalation

                        Tasks