General

  • Target

    e2-0126.zip

  • Size

    703KB

  • Sample

    210126-7h2rx4mcls

  • MD5

    f62edc485ad2bed8bf624b5a5033cae1

  • SHA1

    5748f7dee6a013cd95a996ed92659bc0f5f86272

  • SHA256

    597aa48a1c12f098911b42d59e1cfdb33e99409ebe1c5d728efebb6d6d9b540f

  • SHA512

    7b39b2a6b35207ad7849edef60b026c0791e8c52f121fab66133b769db600dac91bde520ed08666f511f0a5ff72fe2e9c053a56b19a6a89681ce6cb320073541

Malware Config

Extracted

Family

emotet

Botnet

LEA

C2

80.158.3.161:443

80.158.51.209:8080

80.158.35.51:80

80.158.63.78:443

80.158.53.167:80

80.158.62.194:443

80.158.59.174:8080

80.158.43.136:80

rsa_pubkey.plain

Targets

    • Target

      qhobdnuklimea.zsa

    • Size

      404KB

    • MD5

      9a062ead5b2d55af0a5a4b39c5b5eadc

    • SHA1

      fc83367be87c700a696b0329dab538b5e47d90bf

    • SHA256

      a9c68d527223db40014d067cf4fdae5be46cca67387e9cfdff118276085f23ef

    • SHA512

      693ab862c7e3c5dad3ca3d44bbc4a5a4c2391ff558e02e86e4c1d7d1fa7c00b4acf1c426ca619dea2b422997caaf1f0ecba37ec0ffca19edaca297005c9ad861

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Blocklisted process makes network request

    • Drops file in System32 directory

    • Enumerates physical storage devices

      Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks