General

  • Target

    E2-20201117_191500.zip

  • Size

    174KB

  • Sample

    201118-rt34a6jzws

  • MD5

    d7c26608694c830a281f415fbb3e7627

  • SHA1

    7e9fab5bcaea005b73bc27a5c46347ca4619e5bb

  • SHA256

    ef45a0badd07b12690f16325cc543adb2404331beafa34fc90ef97dea873f582

  • SHA512

    64b911c65f5bbd475d266d099dea84ee7769444b5a3f66bd6b8e45daeec69ee8165e12f72bf88d20f822a84900978a75098178f56aa3260bf6ef0571f09c71ef

Malware Config

Extracted

Family

emotet

Botnet

Epoch2

C2

24.69.65.8:8080

74.128.121.17:80

64.207.182.168:8080

51.89.36.180:443

51.89.199.141:8080

208.74.26.234:80

112.185.64.233:80

98.150.169.135:80

115.94.207.99:443

203.153.216.189:7080

2.58.16.89:8080

12.184.217.101:80

202.134.4.216:8080

109.116.245.80:80

110.145.101.66:443

95.9.5.93:80

104.32.141.43:80

190.146.92.48:80

139.162.60.124:8080

187.161.206.24:80

rsa_pubkey.plain

Targets

    • Target

      653d2bd13a427256b2531c14467d22037b64752fd219f4c30d7aa6bad4faa220.exe

    • Size

      292KB

    • MD5

      de86a5d176731be548f1650935a7600b

    • SHA1

      c59f4169b29e000abcd749f7526e26017ac10e3c

    • SHA256

      653d2bd13a427256b2531c14467d22037b64752fd219f4c30d7aa6bad4faa220

    • SHA512

      bdb44d953cbd417733a3429851b60b0e61fb8d3404e2213383831931766767a21483cb3c3fe904be2d681cf9eeda873614db1ec7e488af6726aa519c0dd6c259

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Emotet Payload

      Detects Emotet payload in memory.

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Matrix

Tasks