General

  • Target

    emotet_e3_dd2d8c10197dcca0cab06edd9aad785d8b5c2d49427afd1bea9b1c40b84729e8_2020-10-28__120458285001._fpx

  • Size

    220KB

  • Sample

    201028-yzyzbl7f7n

  • MD5

    6d7b7ee7fa9b8215c87b29106ff02597

  • SHA1

    c4478453bc4a0f74dc609b99e2ece98795f75db3

  • SHA256

    dd2d8c10197dcca0cab06edd9aad785d8b5c2d49427afd1bea9b1c40b84729e8

  • SHA512

    31bf55a279c81e8b45205702933f567940417c02e1e1f925f8288441ad2c8f47303e61f53173cd57c900fb4e2ec8fb9afa80df0713715f3bc49be140f0aafec3

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://www.panoramafe.com/slabbing/bBkdFoF96m/

exe.dropper

http://www.enolil-loo.com/agillawood/CZafm/

exe.dropper

http://www.394509.com/biogenesis/ab/

exe.dropper

http://oluwatomiwa.com/mail.oluwatomiwa.com/T/

exe.dropper

http://mansa.com.vn/myographist/zRf6yPRec/

exe.dropper

http://asianprosource.com/verb/rdB6m/

exe.dropper

http://khangnguyen.store/wp-includes/theme-compat/eSIyT/

Targets

    • Target

      emotet_e3_dd2d8c10197dcca0cab06edd9aad785d8b5c2d49427afd1bea9b1c40b84729e8_2020-10-28__120458285001._fpx

    • Size

      220KB

    • MD5

      6d7b7ee7fa9b8215c87b29106ff02597

    • SHA1

      c4478453bc4a0f74dc609b99e2ece98795f75db3

    • SHA256

      dd2d8c10197dcca0cab06edd9aad785d8b5c2d49427afd1bea9b1c40b84729e8

    • SHA512

      31bf55a279c81e8b45205702933f567940417c02e1e1f925f8288441ad2c8f47303e61f53173cd57c900fb4e2ec8fb9afa80df0713715f3bc49be140f0aafec3

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blacklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks