General

  • Target

    emotet_e2_a2bcf8448d750c86b5c731c98eb8cfa82794467d5ca033cddf314ce3e491306d_2021-01-12__210108063850._doc

  • Size

    158KB

  • Sample

    210112-cm5gedcje2

  • MD5

    27929fb74ba40de65bcebec60915c8e2

  • SHA1

    82a61aa00c71ecc1143de4526c38a5b5e580c8ec

  • SHA256

    a2bcf8448d750c86b5c731c98eb8cfa82794467d5ca033cddf314ce3e491306d

  • SHA512

    d502b7e369014bce46fc53ff8472d2fce47cd8e7d430db1c5a23d19180b6cdc1f88a5b1e81ef1766e8e70e842e2a63421ac90753bf4aaf4e9895e59aa728e83c

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://remediis.com/t/gm2X/

exe.dropper

http://avadnansahin.com/wp-includes/w/

exe.dropper

http://solicon.us/allam-cycle-1c4gn/f5z/

exe.dropper

http://www.riparazioni-radiotv.com/softaculous/DZz/

exe.dropper

http://www.agricampeggiocortecomotto.it/wp-admin/s7p1/

exe.dropper

https://www.starlingtechs.com/GNM/

exe.dropper

http://hellas-darmstadt.de/cgi-bin/ZSoo/

Targets

    • Target

      emotet_e2_a2bcf8448d750c86b5c731c98eb8cfa82794467d5ca033cddf314ce3e491306d_2021-01-12__210108063850._doc

    • Size

      158KB

    • MD5

      27929fb74ba40de65bcebec60915c8e2

    • SHA1

      82a61aa00c71ecc1143de4526c38a5b5e580c8ec

    • SHA256

      a2bcf8448d750c86b5c731c98eb8cfa82794467d5ca033cddf314ce3e491306d

    • SHA512

      d502b7e369014bce46fc53ff8472d2fce47cd8e7d430db1c5a23d19180b6cdc1f88a5b1e81ef1766e8e70e842e2a63421ac90753bf4aaf4e9895e59aa728e83c

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks