General

  • Target

    emotet_e2_005b7211dfe87b486935e4f2523309116f0bf184618277df6a5d2eafc326841b_2021-01-12__222259996452._doc

  • Size

    157KB

  • Sample

    210112-hxdx3d2ldx

  • MD5

    a7bcbd78fc4dfbc4f25b2a74e0d5aba6

  • SHA1

    ac11643c69b015ecc57ac529fd84ab5ca5859c57

  • SHA256

    005b7211dfe87b486935e4f2523309116f0bf184618277df6a5d2eafc326841b

  • SHA512

    87901bd5560f943bfa5269441902b7b0c7b7d1c0f6b4fd2b6c88a9a3e98585dd3a36e9584353c7c7f3812a3db416373247ee6002d8960467e5b635121fdec360

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://remediis.com/t/gm2X/

exe.dropper

http://avadnansahin.com/wp-includes/w/

exe.dropper

http://solicon.us/allam-cycle-1c4gn/f5z/

exe.dropper

http://www.riparazioni-radiotv.com/softaculous/DZz/

exe.dropper

http://www.agricampeggiocortecomotto.it/wp-admin/s7p1/

exe.dropper

https://www.starlingtechs.com/GNM/

exe.dropper

http://hellas-darmstadt.de/cgi-bin/ZSoo/

Targets

    • Target

      emotet_e2_005b7211dfe87b486935e4f2523309116f0bf184618277df6a5d2eafc326841b_2021-01-12__222259996452._doc

    • Size

      157KB

    • MD5

      a7bcbd78fc4dfbc4f25b2a74e0d5aba6

    • SHA1

      ac11643c69b015ecc57ac529fd84ab5ca5859c57

    • SHA256

      005b7211dfe87b486935e4f2523309116f0bf184618277df6a5d2eafc326841b

    • SHA512

      87901bd5560f943bfa5269441902b7b0c7b7d1c0f6b4fd2b6c88a9a3e98585dd3a36e9584353c7c7f3812a3db416373247ee6002d8960467e5b635121fdec360

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks