General

  • Target

    emotet_e2_81d39810e27aaae72ecf4954290cc9133abe3fd0968a9f787c224017b5ade239_2021-01-12__212003375422._doc

  • Size

    158KB

  • Sample

    210112-k9dhmjt95s

  • MD5

    891461e859d74c54f7c50edcf2377d05

  • SHA1

    ffc3fb63df00e3c3c2c98fa2a93dde601ff9df65

  • SHA256

    81d39810e27aaae72ecf4954290cc9133abe3fd0968a9f787c224017b5ade239

  • SHA512

    83479d18e565b48a5cc66ed4c230bc3161e1f9cc274bba5eaa3cd84e02c51cde6a44ed276af36d9ab9f09545f819bbdc9d167c3b4de53749219c87d479cba6fb

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://remediis.com/t/gm2X/

exe.dropper

http://avadnansahin.com/wp-includes/w/

exe.dropper

http://solicon.us/allam-cycle-1c4gn/f5z/

exe.dropper

http://www.riparazioni-radiotv.com/softaculous/DZz/

exe.dropper

http://www.agricampeggiocortecomotto.it/wp-admin/s7p1/

exe.dropper

https://www.starlingtechs.com/GNM/

exe.dropper

http://hellas-darmstadt.de/cgi-bin/ZSoo/

Targets

    • Target

      emotet_e2_81d39810e27aaae72ecf4954290cc9133abe3fd0968a9f787c224017b5ade239_2021-01-12__212003375422._doc

    • Size

      158KB

    • MD5

      891461e859d74c54f7c50edcf2377d05

    • SHA1

      ffc3fb63df00e3c3c2c98fa2a93dde601ff9df65

    • SHA256

      81d39810e27aaae72ecf4954290cc9133abe3fd0968a9f787c224017b5ade239

    • SHA512

      83479d18e565b48a5cc66ed4c230bc3161e1f9cc274bba5eaa3cd84e02c51cde6a44ed276af36d9ab9f09545f819bbdc9d167c3b4de53749219c87d479cba6fb

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks