General

  • Target

    emotet_e2_f582def432e13ece8b95e4ef399332f18cc093c85db59f4f4f0ce822447b465a_2021-01-21__033450347396._fpx

  • Size

    166KB

  • Sample

    210121-qjxcajxtmj

  • MD5

    d91fe8d71a8802624a89f60c77e1212f

  • SHA1

    5ef4e7f974e69110b85080a8a4d6277f52562666

  • SHA256

    f582def432e13ece8b95e4ef399332f18cc093c85db59f4f4f0ce822447b465a

  • SHA512

    c3fcb7bfe37fcba7a7e6c7b7f276cf2fa11fa1b0367d6e2dc78d32d2cf438d3f1adefba1965ad609af99a1da16dd161d1eb05f9d997f04e079c82c6698dd5517

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://trendmoversdubai.com/cgi-bin/B73/

exe.dropper

http://dryaquelingrdo.com/wp-content/SI/

exe.dropper

http://bardiastore.com/wp-admin/A1283/

exe.dropper

http://oxycode.net/wp-admin/x/

exe.dropper

http://fabulousstylz.net/248152296/TpI/

exe.dropper

http://abdo-alyemeni.com/wp-admin/seG6/

exe.dropper

http://giteslacolombiere.com/wp-admin/FV/

Targets

    • Target

      emotet_e2_f582def432e13ece8b95e4ef399332f18cc093c85db59f4f4f0ce822447b465a_2021-01-21__033450347396._fpx

    • Size

      166KB

    • MD5

      d91fe8d71a8802624a89f60c77e1212f

    • SHA1

      5ef4e7f974e69110b85080a8a4d6277f52562666

    • SHA256

      f582def432e13ece8b95e4ef399332f18cc093c85db59f4f4f0ce822447b465a

    • SHA512

      c3fcb7bfe37fcba7a7e6c7b7f276cf2fa11fa1b0367d6e2dc78d32d2cf438d3f1adefba1965ad609af99a1da16dd161d1eb05f9d997f04e079c82c6698dd5517

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Enumerates physical storage devices

      Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks