General
-
Target
e2-0126.zip
-
Size
703KB
-
Sample
210126-7h2rx4mcls
-
MD5
f62edc485ad2bed8bf624b5a5033cae1
-
SHA1
5748f7dee6a013cd95a996ed92659bc0f5f86272
-
SHA256
597aa48a1c12f098911b42d59e1cfdb33e99409ebe1c5d728efebb6d6d9b540f
-
SHA512
7b39b2a6b35207ad7849edef60b026c0791e8c52f121fab66133b769db600dac91bde520ed08666f511f0a5ff72fe2e9c053a56b19a6a89681ce6cb320073541
Static task
static1
Behavioral task
behavioral1
Sample
qhobdnuklimea.zsa.dll
Resource
win7v20201028
Behavioral task
behavioral2
Sample
qhobdnuklimea.zsa.dll
Resource
win10v20201028
Malware Config
Extracted
emotet
LEA
80.158.3.161:443
80.158.51.209:8080
80.158.35.51:80
80.158.63.78:443
80.158.53.167:80
80.158.62.194:443
80.158.59.174:8080
80.158.43.136:80
Targets
-
-
Target
qhobdnuklimea.zsa
-
Size
404KB
-
MD5
9a062ead5b2d55af0a5a4b39c5b5eadc
-
SHA1
fc83367be87c700a696b0329dab538b5e47d90bf
-
SHA256
a9c68d527223db40014d067cf4fdae5be46cca67387e9cfdff118276085f23ef
-
SHA512
693ab862c7e3c5dad3ca3d44bbc4a5a4c2391ff558e02e86e4c1d7d1fa7c00b4acf1c426ca619dea2b422997caaf1f0ecba37ec0ffca19edaca297005c9ad861
Score10/10-
Blocklisted process makes network request
-
Drops file in System32 directory
-
Enumerates physical storage devices
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
MITRE ATT&CK Matrix
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation