General

  • Target

    emotet_e2_8f3ce1e65c3303a8f45d09cfdb4d86b3291bd84c6c424ebbc15805b3819d8425_2021-01-12__193336757277._doc

  • Size

    158KB

  • Sample

    210112-5rrt5ql8ys

  • MD5

    bdbca28b35df7dfc39d1c5ee10321f07

  • SHA1

    316175e1aa51521dcadff6f44c5266896b935c23

  • SHA256

    8f3ce1e65c3303a8f45d09cfdb4d86b3291bd84c6c424ebbc15805b3819d8425

  • SHA512

    ea0faea43c57f04b874f97a4518a7ebe3a4be4a824c154d4f24f3e0d0fb5e7d1ed3c29b6d279eee45b81c94e77836333db36df40f279b80c83b7c27d67d1a220

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://shulovbaazar.com/c/bcL6/

exe.dropper

https://mybusinessevent.com/tiki-install/e/

exe.dropper

http://uhk.cncranes.com/ErrorPages/3/

exe.dropper

https://capturetheaction.com.au/wp-includes/Yjp/

exe.dropper

https://thenetworker.ca/comment/8N4/

exe.dropper

https://trayonlinegh.com/cgi-bin/HBPR/

exe.dropper

http://mmo.martinpollock.co.uk/a/SQSGg/

Targets

    • Target

      emotet_e2_8f3ce1e65c3303a8f45d09cfdb4d86b3291bd84c6c424ebbc15805b3819d8425_2021-01-12__193336757277._doc

    • Size

      158KB

    • MD5

      bdbca28b35df7dfc39d1c5ee10321f07

    • SHA1

      316175e1aa51521dcadff6f44c5266896b935c23

    • SHA256

      8f3ce1e65c3303a8f45d09cfdb4d86b3291bd84c6c424ebbc15805b3819d8425

    • SHA512

      ea0faea43c57f04b874f97a4518a7ebe3a4be4a824c154d4f24f3e0d0fb5e7d1ed3c29b6d279eee45b81c94e77836333db36df40f279b80c83b7c27d67d1a220

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks