General

  • Target

    emotet_e2_23c41682a5b7d44bbfc6414dced3e22fca261b1a79453adb5a295f5b546bb2c3_2021-01-13__070542812557._doc

  • Size

    157KB

  • Sample

    210113-81v8r18h4e

  • MD5

    c56741467cf89836954cc31546b3fb7b

  • SHA1

    75d0e53164cd17d766bae0170f592a7a3be2d4f0

  • SHA256

    23c41682a5b7d44bbfc6414dced3e22fca261b1a79453adb5a295f5b546bb2c3

  • SHA512

    dd35f860307f9d18551c107096d67a00f73735cfb3f11d8c2fb46329e7a3576dbe30dd8f33aab6559a9ed8fd438e728b0ed11cf05c4ef7cab7cb7215986352ee

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://altrashift.com/wp-includes/I/

exe.dropper

https://ojodetigremezcal.com/wp/i62s/

exe.dropper

https://snowremoval-services.com/wp-content/P3Z/

exe.dropper

http://kitsunecomplements.com/too-much-phppq/n65U/

exe.dropper

https://imperioone.com/content/WOBq/

exe.dropper

http://www.autoeck-baden.at/wp-content/w0Vb/

exe.dropper

https://shop.animewho.com/content/Tj/

Targets

    • Target

      emotet_e2_23c41682a5b7d44bbfc6414dced3e22fca261b1a79453adb5a295f5b546bb2c3_2021-01-13__070542812557._doc

    • Size

      157KB

    • MD5

      c56741467cf89836954cc31546b3fb7b

    • SHA1

      75d0e53164cd17d766bae0170f592a7a3be2d4f0

    • SHA256

      23c41682a5b7d44bbfc6414dced3e22fca261b1a79453adb5a295f5b546bb2c3

    • SHA512

      dd35f860307f9d18551c107096d67a00f73735cfb3f11d8c2fb46329e7a3576dbe30dd8f33aab6559a9ed8fd438e728b0ed11cf05c4ef7cab7cb7215986352ee

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks