General

  • Target

    emotet_e3_683573224327e8cecc5d38f690c4598f52ece7bd878b05e7f279111680604d5b_2020-10-29__161255577856._doc

  • Size

    227KB

  • Sample

    201029-ttzhs83m1x

  • MD5

    9302cda391554ab9cd2a2012057bbd93

  • SHA1

    73a9ace74211841912ee09399de898b221e47bf3

  • SHA256

    683573224327e8cecc5d38f690c4598f52ece7bd878b05e7f279111680604d5b

  • SHA512

    3496a3261ddccd2ebc8c6b4c4451a9adcac348d38112a1fda76ec1c6886ecc0ab92eefbb8db78be5a03463de4b596182adeeaa21e62a0f82348df5e90df8057a

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://enjoymylifecheryl.com/wp-includes/FPNxoUiCz3/

exe.dropper

https://homewatchamelia.com/wp-admin/qmK/

exe.dropper

https://seramporemunicipality.org/replacement-vin/Ql4R/

exe.dropper

https://imperfectdream.com/wp-content/xb2csjPW6/

exe.dropper

https://mayxaycafe.net/wp-includes/UxdWFzYQj/

exe.dropper

https://420extracts.ca/cgi-bin/Ecv/

exe.dropper

https://casinopalacett.com/wp-admin/voZDArg/

Extracted

Family

emotet

Botnet

Epoch3

C2

152.32.75.74:443

91.121.200.35:8080

159.203.16.11:8080

188.226.165.170:8080

139.59.61.215:443

78.90.78.210:80

179.5.118.12:80

202.29.237.113:8080

5.79.70.250:8080

185.80.172.199:80

47.154.85.229:80

198.20.228.9:8080

85.246.78.192:80

190.212.140.6:80

181.59.59.54:80

115.79.59.157:80

54.38.143.245:8080

42.200.96.63:80

5.12.246.155:80

74.208.173.91:8080

rsa_pubkey.plain

Targets

    • Target

      emotet_e3_683573224327e8cecc5d38f690c4598f52ece7bd878b05e7f279111680604d5b_2020-10-29__161255577856._doc

    • Size

      227KB

    • MD5

      9302cda391554ab9cd2a2012057bbd93

    • SHA1

      73a9ace74211841912ee09399de898b221e47bf3

    • SHA256

      683573224327e8cecc5d38f690c4598f52ece7bd878b05e7f279111680604d5b

    • SHA512

      3496a3261ddccd2ebc8c6b4c4451a9adcac348d38112a1fda76ec1c6886ecc0ab92eefbb8db78be5a03463de4b596182adeeaa21e62a0f82348df5e90df8057a

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Emotet Payload

      Detects Emotet payload in memory.

    • Blacklisted process makes network request

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks