General
-
Target
ST_Heodo_ST_2021-01-05_19-42-08-628.eml_20210105Auftrag.doc_analyze.doc
-
Size
143KB
-
Sample
210106-af33nj68sx
-
MD5
b65dfb31fa424584160c388da6a063a6
-
SHA1
b0167ddce3fc7580b29f19d4e82e1aaa69edacc4
-
SHA256
8cfb715353dbbbc60a56ac17fcd804e76515221f520154f994a76e8909a403f7
-
SHA512
afcb110f6dfceb31be600f862657737c82c95a45c297ab4e5715a60cb8703847734c63cc9c7dd1dd6198bf51fee91c6e25d185c2a2cb69ff6df1cf61bf1ccc23
Static task
static1
Behavioral task
behavioral1
Sample
ST_Heodo_ST_2021-01-05_19-42-08-628.eml_20210105Auftrag.doc_analyze.doc
Resource
win7v20201028
Malware Config
Extracted
https://obob.tv/content/rpKmYv/
http://infoprocenter.com/wp-admin/MSInfo/
http://miprimercamino.com/cgi-bin/AJ09AzChrK/
http://mobilepro-tm.online/wp-admin/VGX/
https://www.terrakulturegallery.com/wp-admin/ZNg6V7pv/
http://bingdaofuzhu.com/wp-content/L/
Extracted
emotet
Epoch3
125.0.215.60:80
163.53.204.180:443
89.163.210.141:8080
203.157.152.9:7080
157.245.145.87:443
82.78.179.117:443
85.247.144.202:80
37.46.129.215:8080
110.37.224.243:80
192.210.217.94:8080
2.82.75.215:80
69.159.11.38:443
188.166.220.180:7080
103.93.220.182:80
198.20.228.9:8080
91.75.75.46:80
88.247.30.64:80
189.211.214.19:443
203.160.167.243:80
178.33.167.120:8080
178.254.36.182:8080
70.32.89.105:8080
103.80.51.61:8080
54.38.143.245:8080
113.203.238.130:80
50.116.78.109:8080
195.201.56.70:8080
109.99.146.210:8080
75.127.14.170:8080
172.193.14.201:80
203.56.191.129:8080
157.7.164.178:8081
46.32.229.152:8080
78.90.78.210:80
116.202.10.123:8080
189.34.18.252:8080
114.158.126.84:80
201.193.160.196:80
79.133.6.236:8080
202.29.237.113:8080
203.153.216.178:7080
172.96.190.154:8080
74.208.173.91:8080
139.59.61.215:443
117.2.139.117:443
24.230.124.78:80
5.83.32.101:80
139.5.101.203:80
8.4.9.137:8080
120.51.34.254:80
188.226.165.170:8080
91.83.93.103:443
183.91.3.63:80
192.241.220.183:8080
190.18.184.113:80
2.58.16.86:8080
5.79.70.250:8080
113.161.176.235:80
46.105.131.68:8080
223.17.215.76:80
186.146.229.172:80
186.96.170.61:80
121.117.147.153:443
192.163.221.191:8080
139.59.12.63:8080
115.79.195.246:80
172.104.46.84:8080
180.52.66.193:80
185.208.226.142:8080
152.32.75.74:443
143.95.101.72:8080
47.150.238.196:80
201.212.201.127:8080
190.85.46.52:7080
182.73.7.59:8080
178.62.254.156:8080
195.159.28.244:8080
103.229.73.17:8080
103.124.152.221:80
180.148.4.130:8080
60.108.128.186:80
110.172.180.180:8080
162.144.145.58:8080
37.205.9.252:7080
185.142.236.163:443
27.78.27.110:443
58.27.215.3:8080
Targets
-
-
Target
ST_Heodo_ST_2021-01-05_19-42-08-628.eml_20210105Auftrag.doc_analyze.doc
-
Size
143KB
-
MD5
b65dfb31fa424584160c388da6a063a6
-
SHA1
b0167ddce3fc7580b29f19d4e82e1aaa69edacc4
-
SHA256
8cfb715353dbbbc60a56ac17fcd804e76515221f520154f994a76e8909a403f7
-
SHA512
afcb110f6dfceb31be600f862657737c82c95a45c297ab4e5715a60cb8703847734c63cc9c7dd1dd6198bf51fee91c6e25d185c2a2cb69ff6df1cf61bf1ccc23
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Loads dropped DLL
-
Drops file in System32 directory
-