General

  • Target

    emotet_e2_9005833203499e17fc8dc75a6082bd9762dc6acd404ae5dc6b0fba27fa9e1c7a_2021-01-20__235550329182._fpx

  • Size

    166KB

  • Sample

    210120-3r9pbk2kn2

  • MD5

    44a36d5b7b06d5c5769e6b09abbd6ac1

  • SHA1

    5a87b9620511d1a4c543e47d2efc6987aee6f957

  • SHA256

    9005833203499e17fc8dc75a6082bd9762dc6acd404ae5dc6b0fba27fa9e1c7a

  • SHA512

    a11515c7f28ef398fd5b735d3e7875bdc59d8423b86a4925b4edbc2ce72d1b759e02d3c2aa6b621a77fbdbfa9d8e4d83b8d6a8f13319614189d741eaa78f2343

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://trendmoversdubai.com/cgi-bin/B73/

exe.dropper

http://dryaquelingrdo.com/wp-content/SI/

exe.dropper

http://bardiastore.com/wp-admin/A1283/

exe.dropper

http://oxycode.net/wp-admin/x/

exe.dropper

http://fabulousstylz.net/248152296/TpI/

exe.dropper

http://abdo-alyemeni.com/wp-admin/seG6/

exe.dropper

http://giteslacolombiere.com/wp-admin/FV/

Targets

    • Target

      emotet_e2_9005833203499e17fc8dc75a6082bd9762dc6acd404ae5dc6b0fba27fa9e1c7a_2021-01-20__235550329182._fpx

    • Size

      166KB

    • MD5

      44a36d5b7b06d5c5769e6b09abbd6ac1

    • SHA1

      5a87b9620511d1a4c543e47d2efc6987aee6f957

    • SHA256

      9005833203499e17fc8dc75a6082bd9762dc6acd404ae5dc6b0fba27fa9e1c7a

    • SHA512

      a11515c7f28ef398fd5b735d3e7875bdc59d8423b86a4925b4edbc2ce72d1b759e02d3c2aa6b621a77fbdbfa9d8e4d83b8d6a8f13319614189d741eaa78f2343

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Enumerates physical storage devices

      Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks