General

  • Target

    emotet_e2_c86ff530960a0e2a0765885f2d0a7171f57cd964011eb7c48500bbb162ad4415_2021-01-12__221037616212._doc

  • Size

    158KB

  • Sample

    210112-2fzcc7t63s

  • MD5

    945712b74958b4dbc0adccf48ee59080

  • SHA1

    af8dc5ec442108c219c384909b1956a4c8f3ce60

  • SHA256

    c86ff530960a0e2a0765885f2d0a7171f57cd964011eb7c48500bbb162ad4415

  • SHA512

    757edf6aefc5aace7cb1d61cf606d878ba99a9e7030a6eda472fe997d2c7755711d9179395564ab2fa73848eb0b3b8f5d609fb1b85d24e4c96e18824c05f025d

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://remediis.com/t/gm2X/

exe.dropper

http://avadnansahin.com/wp-includes/w/

exe.dropper

http://solicon.us/allam-cycle-1c4gn/f5z/

exe.dropper

http://www.riparazioni-radiotv.com/softaculous/DZz/

exe.dropper

http://www.agricampeggiocortecomotto.it/wp-admin/s7p1/

exe.dropper

https://www.starlingtechs.com/GNM/

exe.dropper

http://hellas-darmstadt.de/cgi-bin/ZSoo/

Targets

    • Target

      emotet_e2_c86ff530960a0e2a0765885f2d0a7171f57cd964011eb7c48500bbb162ad4415_2021-01-12__221037616212._doc

    • Size

      158KB

    • MD5

      945712b74958b4dbc0adccf48ee59080

    • SHA1

      af8dc5ec442108c219c384909b1956a4c8f3ce60

    • SHA256

      c86ff530960a0e2a0765885f2d0a7171f57cd964011eb7c48500bbb162ad4415

    • SHA512

      757edf6aefc5aace7cb1d61cf606d878ba99a9e7030a6eda472fe997d2c7755711d9179395564ab2fa73848eb0b3b8f5d609fb1b85d24e4c96e18824c05f025d

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks