Analysis
-
max time kernel
18s -
max time network
130s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
26-01-2021 13:58
Static task
static1
Behavioral task
behavioral1
Sample
90e4f02ab9157f389d785c3dcddfa432085b237f2a4c3befb4a093d0f2711b5b.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
90e4f02ab9157f389d785c3dcddfa432085b237f2a4c3befb4a093d0f2711b5b.exe
-
Size
647KB
-
MD5
13b9d586bb973ac14bfa24e4ae7b24f1
-
SHA1
a5653ebe4fa9f906554e56f4d732489189c3a3f9
-
SHA256
90e4f02ab9157f389d785c3dcddfa432085b237f2a4c3befb4a093d0f2711b5b
-
SHA512
517b1728ac24a587c6a4ccb7c0ea18f2059609958eb06f06107efd5a2e06faf0caa78c49f252e8b2e602a88de194e7edb1f4aaf1efe423298e94257c3df902ae
Malware Config
Extracted
Family
emotet
Botnet
LEA
C2
80.158.59.174:8080
80.158.43.136:80
80.158.3.161:443
80.158.51.209:8080
80.158.35.51:80
80.158.63.78:443
80.158.53.167:80
80.158.62.194:443
rsa_pubkey.plain
Signatures
-
Emotet Payload 3 IoCs
Detects Emotet payload in memory.
resource yara_rule behavioral2/memory/4808-2-0x0000000000120000-0x000000000017B000-memory.dmp emotet behavioral2/memory/4808-3-0x0000000000180000-0x00000000001DA000-memory.dmp emotet behavioral2/memory/4808-4-0x0000000002700000-0x0000000002759000-memory.dmp emotet -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4808 90e4f02ab9157f389d785c3dcddfa432085b237f2a4c3befb4a093d0f2711b5b.exe 4808 90e4f02ab9157f389d785c3dcddfa432085b237f2a4c3befb4a093d0f2711b5b.exe 4808 90e4f02ab9157f389d785c3dcddfa432085b237f2a4c3befb4a093d0f2711b5b.exe 4808 90e4f02ab9157f389d785c3dcddfa432085b237f2a4c3befb4a093d0f2711b5b.exe 4808 90e4f02ab9157f389d785c3dcddfa432085b237f2a4c3befb4a093d0f2711b5b.exe 4808 90e4f02ab9157f389d785c3dcddfa432085b237f2a4c3befb4a093d0f2711b5b.exe