General

  • Target

    emotet_e2_bbfe3ea8f9858dd6c471597af70f3dffd7eb6ca27a380dec530dca5db68ca7e0_2021-01-12__223535820150._doc

  • Size

    157KB

  • Sample

    210112-mhgssn911x

  • MD5

    f9f0c329ff4e6d31153e17ae4418bb0b

  • SHA1

    605fa87cb3d4fde975796f21a3bbe83f068a8a4f

  • SHA256

    bbfe3ea8f9858dd6c471597af70f3dffd7eb6ca27a380dec530dca5db68ca7e0

  • SHA512

    7904a18b7752b552c79ef1208d69361229bf327a4dcedc785feefe0742d5995630988ae9681d3d7784c84f658b772c367538cbe4148da3a5b2b93a75a2cae1a1

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://remediis.com/t/gm2X/

exe.dropper

http://avadnansahin.com/wp-includes/w/

exe.dropper

http://solicon.us/allam-cycle-1c4gn/f5z/

exe.dropper

http://www.riparazioni-radiotv.com/softaculous/DZz/

exe.dropper

http://www.agricampeggiocortecomotto.it/wp-admin/s7p1/

exe.dropper

https://www.starlingtechs.com/GNM/

exe.dropper

http://hellas-darmstadt.de/cgi-bin/ZSoo/

Targets

    • Target

      emotet_e2_bbfe3ea8f9858dd6c471597af70f3dffd7eb6ca27a380dec530dca5db68ca7e0_2021-01-12__223535820150._doc

    • Size

      157KB

    • MD5

      f9f0c329ff4e6d31153e17ae4418bb0b

    • SHA1

      605fa87cb3d4fde975796f21a3bbe83f068a8a4f

    • SHA256

      bbfe3ea8f9858dd6c471597af70f3dffd7eb6ca27a380dec530dca5db68ca7e0

    • SHA512

      7904a18b7752b552c79ef1208d69361229bf327a4dcedc785feefe0742d5995630988ae9681d3d7784c84f658b772c367538cbe4148da3a5b2b93a75a2cae1a1

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks