General

  • Target

    e1-0126.zip

  • Size

    229KB

  • Sample

    210126-kfr6lrqj2j

  • MD5

    70959001bb39fb62822fdafe6ae9e7e0

  • SHA1

    1fe8f45c68186b1fadd3866bfd52b636ac91c959

  • SHA256

    f6d85f3e1994ebb17b63fca126381ebc5adff4ba5358558512850c7d907d2ff5

  • SHA512

    7df108e382d2e87d8ae058cf6a4980562bc4cc3e711491f06e5d5b4214aecb467aa804a30df97a07ec0415e71e3965a5296a4ff418fe1c102f970a75b77ed475

Malware Config

Extracted

Family

emotet

Botnet

LEA

C2

80.158.3.161:443

80.158.51.209:8080

80.158.35.51:80

80.158.63.78:443

80.158.53.167:80

80.158.62.194:443

80.158.59.174:8080

80.158.43.136:80

rsa_pubkey.plain

Targets

    • Target

      sxkfec.tld

    • Size

      404KB

    • MD5

      9a062ead5b2d55af0a5a4b39c5b5eadc

    • SHA1

      fc83367be87c700a696b0329dab538b5e47d90bf

    • SHA256

      a9c68d527223db40014d067cf4fdae5be46cca67387e9cfdff118276085f23ef

    • SHA512

      693ab862c7e3c5dad3ca3d44bbc4a5a4c2391ff558e02e86e4c1d7d1fa7c00b4acf1c426ca619dea2b422997caaf1f0ecba37ec0ffca19edaca297005c9ad861

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Blocklisted process makes network request

    • Drops file in System32 directory

    • Enumerates physical storage devices

      Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks