Resubmissions

31-10-2020 01:17

201031-hp7xrx3dp6 10

31-10-2020 01:16

201031-c3nkhnl26e 10

General

  • Target

    8bd9939dabc1c57a46d596c9ae13646b5ca27f9a33e544c46ecfb58e729ceda4

  • Size

    209KB

  • Sample

    201031-c3nkhnl26e

  • MD5

    74f56116f882efc1b2d432e362c84654

  • SHA1

    10a00bdb8a61421f4868232ad6ea987121bd91bb

  • SHA256

    8bd9939dabc1c57a46d596c9ae13646b5ca27f9a33e544c46ecfb58e729ceda4

  • SHA512

    70f588d809b203b1f19f88cbf927d820b37b6bdd3358c47cfe5d7812695780f8a808d4b51fa7b90a8e88b2d25f1d11bd9620b9e696e1a39757202d5b171f8e2d

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://inbichngoc.com/wp-admin/K/

exe.dropper

http://www.angiathinh.com/autotoxication/96F/

exe.dropper

http://www.meshzs.com/wp-includes/p6/

exe.dropper

https://dartzeel.com/wp-content/jHy/

exe.dropper

https://zhidong.store/wp-content/BDY/

exe.dropper

https://australaqua.com/wp-content/xIt/

exe.dropper

https://nurmarkaz.org/designl/u/

Extracted

Family

emotet

Botnet

Epoch1

C2

190.202.229.74:80

118.69.11.81:7080

70.39.251.94:8080

87.230.25.43:8080

94.23.62.116:8080

37.187.161.206:8080

45.46.37.97:80

138.97.60.141:7080

177.144.130.105:8080

169.1.39.242:80

209.236.123.42:8080

202.134.4.210:7080

193.251.77.110:80

2.45.176.233:80

217.13.106.14:8080

189.223.16.99:80

190.101.156.139:80

77.238.212.227:80

181.58.181.9:80

37.183.81.217:80

rsa_pubkey.plain

Targets

    • Target

      8bd9939dabc1c57a46d596c9ae13646b5ca27f9a33e544c46ecfb58e729ceda4

    • Size

      209KB

    • MD5

      74f56116f882efc1b2d432e362c84654

    • SHA1

      10a00bdb8a61421f4868232ad6ea987121bd91bb

    • SHA256

      8bd9939dabc1c57a46d596c9ae13646b5ca27f9a33e544c46ecfb58e729ceda4

    • SHA512

      70f588d809b203b1f19f88cbf927d820b37b6bdd3358c47cfe5d7812695780f8a808d4b51fa7b90a8e88b2d25f1d11bd9620b9e696e1a39757202d5b171f8e2d

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Emotet Payload

      Detects Emotet payload in memory.

    • Blacklisted process makes network request

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks