Analysis

  • max time kernel
    63s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    17-11-2020 15:10

General

  • Target

    ba31d7f52eb11a293d58e02a501b9e04.exe

  • Size

    400KB

  • MD5

    43999aa3c5ad3ed0062fcbc0ee055057

  • SHA1

    b6c74199a6f766189d8926fe75b3c5994128ecd0

  • SHA256

    1895c804b6d023b97d9aa03d4f7538c8127c07972d082357b175de9ba17883e8

  • SHA512

    3cd1922ed59fdd0b45d9d7c601881a60acf9339fbf5486a1e85d5b25b2dafc1e10651b729b954b6d9a91958a0729852ebc872095752cef64dac9c6fe645eff8a

Malware Config

Extracted

Family

emotet

Botnet

Epoch2

C2

102.182.145.130:80

173.173.254.105:80

64.207.182.168:8080

51.89.199.141:8080

167.114.153.111:8080

173.63.222.65:80

218.147.193.146:80

59.125.219.109:443

172.104.97.173:8080

190.162.215.233:80

68.115.186.26:80

78.188.106.53:443

190.240.194.77:443

24.133.106.23:80

80.227.52.78:80

79.137.83.50:443

120.150.218.241:443

62.171.142.179:8080

194.4.58.192:7080

62.30.7.67:443

rsa_pubkey.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Emotet Payload 1 IoCs

    Detects Emotet payload in memory.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ba31d7f52eb11a293d58e02a501b9e04.exe
    "C:\Users\Admin\AppData\Local\Temp\ba31d7f52eb11a293d58e02a501b9e04.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:1032

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/316-4-0x000007FEF71F0000-0x000007FEF746A000-memory.dmp
    Filesize

    2.5MB

  • memory/1032-3-0x0000000000480000-0x0000000000490000-memory.dmp
    Filesize

    64KB