General

  • Target

    emotet_e3_5a526eea1244daf041113d9444a0193fce82f1a10c4f824903c8ef1282affd4c_2020-09-19__132010642456._doc

  • Size

    230KB

  • Sample

    200919-hh9cdy8ezn

  • MD5

    fdccd404e39a0aaa7ac57a6719f7f831

  • SHA1

    92eef9bb7641821014964e7da7d3abbafaa2901b

  • SHA256

    5a526eea1244daf041113d9444a0193fce82f1a10c4f824903c8ef1282affd4c

  • SHA512

    6b077276b519bba60aa9b9f55163fcead5b1f58e520f0c12cb99b3eb8bed2a7f96d00a0595a9b65dcd601c8b5911c5184952665a44ac0100660caf24d3a15d06

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://arsan.com.br/img_b2w/jstgflap98/

exe.dropper

http://koester-pb.de/cgi-bin/HoDIPqV/

exe.dropper

http://aragonmetal.com/_installation/LPMGMZroO/

exe.dropper

https://www.witdigi.com/wp-content/uploads/iBeE/

exe.dropper

http://yellowstonefitness.com/j5es7cx/QgLkys4ga64g228/

Targets

    • Target

      emotet_e3_5a526eea1244daf041113d9444a0193fce82f1a10c4f824903c8ef1282affd4c_2020-09-19__132010642456._doc

    • Size

      230KB

    • MD5

      fdccd404e39a0aaa7ac57a6719f7f831

    • SHA1

      92eef9bb7641821014964e7da7d3abbafaa2901b

    • SHA256

      5a526eea1244daf041113d9444a0193fce82f1a10c4f824903c8ef1282affd4c

    • SHA512

      6b077276b519bba60aa9b9f55163fcead5b1f58e520f0c12cb99b3eb8bed2a7f96d00a0595a9b65dcd601c8b5911c5184952665a44ac0100660caf24d3a15d06

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blacklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks