General

  • Target

    emotet_e2_cb10354a6aff051fe7ae1c2cfb38b40e5ed1c8fd1a4c4b1a35724efed4885995_2020-10-28__112244386138._fpx

  • Size

    241KB

  • Sample

    201028-gtvp2rc3e6

  • MD5

    270f03e3d9fef36f88e51dd5dfec47c1

  • SHA1

    79874b79923b7ea19a4d5caa9c8512767e9a4285

  • SHA256

    cb10354a6aff051fe7ae1c2cfb38b40e5ed1c8fd1a4c4b1a35724efed4885995

  • SHA512

    53c2fac1ef4b5f70eb0a77ff0359e226fabd533e2828b97f90ab4aa1f8a35572fffb7be07efb3775abf9df7ad67539890912429b7a75b901a711264b28ef90d4

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://nanettecook.org/wp-admin/x/

exe.dropper

http://scalarmonitoring.com/wp-admin/js/widgets/S0A/

exe.dropper

https://fourseasonsjsc.com/wp-admin/hzu9vvt/

exe.dropper

https://ningyangseo.com/wp-admin/am/

exe.dropper

https://www.rapidcarwash.net/wp-content/nO6U/

exe.dropper

http://coolchacult.com/wp-includes/i/

exe.dropper

http://anpbodysculpting.com/wp-content/themes/twentytwenty/c/

exe.dropper

https://lamajesteindustries.com/wp-content/DRTujMR/

Targets

    • Target

      emotet_e2_cb10354a6aff051fe7ae1c2cfb38b40e5ed1c8fd1a4c4b1a35724efed4885995_2020-10-28__112244386138._fpx

    • Size

      241KB

    • MD5

      270f03e3d9fef36f88e51dd5dfec47c1

    • SHA1

      79874b79923b7ea19a4d5caa9c8512767e9a4285

    • SHA256

      cb10354a6aff051fe7ae1c2cfb38b40e5ed1c8fd1a4c4b1a35724efed4885995

    • SHA512

      53c2fac1ef4b5f70eb0a77ff0359e226fabd533e2828b97f90ab4aa1f8a35572fffb7be07efb3775abf9df7ad67539890912429b7a75b901a711264b28ef90d4

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blacklisted process makes network request

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks