Analysis
-
max time kernel
21s -
max time network
136s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
26-01-2021 13:58
Static task
static1
Behavioral task
behavioral1
Sample
90e4f02ab9157f389d785c3dcddfa432085b237f2a4c3befb4a093d0f2711b5b.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
90e4f02ab9157f389d785c3dcddfa432085b237f2a4c3befb4a093d0f2711b5b.exe
-
Size
647KB
-
MD5
13b9d586bb973ac14bfa24e4ae7b24f1
-
SHA1
a5653ebe4fa9f906554e56f4d732489189c3a3f9
-
SHA256
90e4f02ab9157f389d785c3dcddfa432085b237f2a4c3befb4a093d0f2711b5b
-
SHA512
517b1728ac24a587c6a4ccb7c0ea18f2059609958eb06f06107efd5a2e06faf0caa78c49f252e8b2e602a88de194e7edb1f4aaf1efe423298e94257c3df902ae
Malware Config
Extracted
Family
emotet
Botnet
LEA
C2
80.158.59.174:8080
80.158.43.136:80
80.158.3.161:443
80.158.51.209:8080
80.158.35.51:80
80.158.63.78:443
80.158.53.167:80
80.158.62.194:443
rsa_pubkey.plain
Signatures
-
Emotet Payload 3 IoCs
Detects Emotet payload in memory.
resource yara_rule behavioral1/memory/2028-3-0x00000000009B0000-0x0000000000A0B000-memory.dmp emotet behavioral1/memory/2028-4-0x0000000000A10000-0x0000000000A6A000-memory.dmp emotet behavioral1/memory/2028-5-0x0000000000160000-0x00000000001B9000-memory.dmp emotet -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2028 90e4f02ab9157f389d785c3dcddfa432085b237f2a4c3befb4a093d0f2711b5b.exe 2028 90e4f02ab9157f389d785c3dcddfa432085b237f2a4c3befb4a093d0f2711b5b.exe 2028 90e4f02ab9157f389d785c3dcddfa432085b237f2a4c3befb4a093d0f2711b5b.exe