General

  • Target

    emotet_e2_27b122df98f5e4ed1eed2bc92bc3634afbe44136cb872621c2a62d8acf28ae82_2021-01-12__205134879942._doc

  • Size

    156KB

  • Sample

    210112-5r7cssvj7a

  • MD5

    215826c05820fe6394082df373ae1e34

  • SHA1

    5296e040a43c006fd68d47869c04d90a04cbbcad

  • SHA256

    27b122df98f5e4ed1eed2bc92bc3634afbe44136cb872621c2a62d8acf28ae82

  • SHA512

    3fbc6bfa63877290f99c7cc42996dbab16c6d291dfee0cf4f7af08fcde25d20a1210002a730e391c14dd29c3440b8db7adfd729c072a69f70888f179401daf81

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://remediis.com/t/gm2X/

exe.dropper

http://avadnansahin.com/wp-includes/w/

exe.dropper

http://solicon.us/allam-cycle-1c4gn/f5z/

exe.dropper

http://www.riparazioni-radiotv.com/softaculous/DZz/

exe.dropper

http://www.agricampeggiocortecomotto.it/wp-admin/s7p1/

exe.dropper

https://www.starlingtechs.com/GNM/

exe.dropper

http://hellas-darmstadt.de/cgi-bin/ZSoo/

Targets

    • Target

      emotet_e2_27b122df98f5e4ed1eed2bc92bc3634afbe44136cb872621c2a62d8acf28ae82_2021-01-12__205134879942._doc

    • Size

      156KB

    • MD5

      215826c05820fe6394082df373ae1e34

    • SHA1

      5296e040a43c006fd68d47869c04d90a04cbbcad

    • SHA256

      27b122df98f5e4ed1eed2bc92bc3634afbe44136cb872621c2a62d8acf28ae82

    • SHA512

      3fbc6bfa63877290f99c7cc42996dbab16c6d291dfee0cf4f7af08fcde25d20a1210002a730e391c14dd29c3440b8db7adfd729c072a69f70888f179401daf81

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks