General

  • Target

    emotet_e2_cf0c2aa78b5e10bf8d17ef6ad77f3ea8f356d6e4d9976f133893dfac8edfc45d_2021-01-12__223222647786._doc

  • Size

    156KB

  • Sample

    210112-jnbq7kmrg6

  • MD5

    3d89f8df471cbdee0c81c4e612a0343b

  • SHA1

    75c7e6855ae18ca948c2f09a9f9d584653288007

  • SHA256

    cf0c2aa78b5e10bf8d17ef6ad77f3ea8f356d6e4d9976f133893dfac8edfc45d

  • SHA512

    f079cc42869c8feb5c4823c368db05bad23d3dcb417bf7ccb377694b8d591cc5d0b0b3606659c5617bc67539482b2d96bc2ebd3e44b5327fffb636e630fa73a9

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://remediis.com/t/gm2X/

exe.dropper

http://avadnansahin.com/wp-includes/w/

exe.dropper

http://solicon.us/allam-cycle-1c4gn/f5z/

exe.dropper

http://www.riparazioni-radiotv.com/softaculous/DZz/

exe.dropper

http://www.agricampeggiocortecomotto.it/wp-admin/s7p1/

exe.dropper

https://www.starlingtechs.com/GNM/

exe.dropper

http://hellas-darmstadt.de/cgi-bin/ZSoo/

Targets

    • Target

      emotet_e2_cf0c2aa78b5e10bf8d17ef6ad77f3ea8f356d6e4d9976f133893dfac8edfc45d_2021-01-12__223222647786._doc

    • Size

      156KB

    • MD5

      3d89f8df471cbdee0c81c4e612a0343b

    • SHA1

      75c7e6855ae18ca948c2f09a9f9d584653288007

    • SHA256

      cf0c2aa78b5e10bf8d17ef6ad77f3ea8f356d6e4d9976f133893dfac8edfc45d

    • SHA512

      f079cc42869c8feb5c4823c368db05bad23d3dcb417bf7ccb377694b8d591cc5d0b0b3606659c5617bc67539482b2d96bc2ebd3e44b5327fffb636e630fa73a9

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks