General

  • Target

    emotet_e2_59bc01982760e33fe233b9563bee465ba59c15dee8d88180cc40ecec4eda0a32_2021-01-22__152820114149._doc

  • Size

    172KB

  • Sample

    210122-qm81wcvy7x

  • MD5

    1a914e7ed24d27fda9787e43db958f44

  • SHA1

    265d764c46102043e8d55406d324447560574863

  • SHA256

    59bc01982760e33fe233b9563bee465ba59c15dee8d88180cc40ecec4eda0a32

  • SHA512

    615980a3b00c3fa1c7fb7bf9285d01d612ce0a193205201ae4669f0228705ccb987b07968de36b5f1a3c84da8ae92657210bedf612b9259f8720bc65f5d47119

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://coworkingplus.es/wp-admin/FxmME/

exe.dropper

http://silkonbusiness.matrixinfotechsolution.com/js/q26/

exe.dropper

https://bbjugueteria.com/s6kscx/Z/

exe.dropper

https://www.bimception.com/wp-admin/sHy5t/

exe.dropper

http://armakonarms.com/wp-includes/fz/

exe.dropper

http://alugrama.com.mx/t/2/

exe.dropper

http://homecass.com/wp-content/iF/

Targets

    • Target

      emotet_e2_59bc01982760e33fe233b9563bee465ba59c15dee8d88180cc40ecec4eda0a32_2021-01-22__152820114149._doc

    • Size

      172KB

    • MD5

      1a914e7ed24d27fda9787e43db958f44

    • SHA1

      265d764c46102043e8d55406d324447560574863

    • SHA256

      59bc01982760e33fe233b9563bee465ba59c15dee8d88180cc40ecec4eda0a32

    • SHA512

      615980a3b00c3fa1c7fb7bf9285d01d612ce0a193205201ae4669f0228705ccb987b07968de36b5f1a3c84da8ae92657210bedf612b9259f8720bc65f5d47119

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Enumerates physical storage devices

      Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks