General
-
Target
e1-0126.zip
-
Size
229KB
-
Sample
210126-kfr6lrqj2j
-
MD5
70959001bb39fb62822fdafe6ae9e7e0
-
SHA1
1fe8f45c68186b1fadd3866bfd52b636ac91c959
-
SHA256
f6d85f3e1994ebb17b63fca126381ebc5adff4ba5358558512850c7d907d2ff5
-
SHA512
7df108e382d2e87d8ae058cf6a4980562bc4cc3e711491f06e5d5b4214aecb467aa804a30df97a07ec0415e71e3965a5296a4ff418fe1c102f970a75b77ed475
Static task
static1
Behavioral task
behavioral1
Sample
sxkfec.tld.dll
Resource
win7v20201028
Behavioral task
behavioral2
Sample
sxkfec.tld.dll
Resource
win10v20201028
Malware Config
Extracted
emotet
LEA
80.158.3.161:443
80.158.51.209:8080
80.158.35.51:80
80.158.63.78:443
80.158.53.167:80
80.158.62.194:443
80.158.59.174:8080
80.158.43.136:80
Targets
-
-
Target
sxkfec.tld
-
Size
404KB
-
MD5
9a062ead5b2d55af0a5a4b39c5b5eadc
-
SHA1
fc83367be87c700a696b0329dab538b5e47d90bf
-
SHA256
a9c68d527223db40014d067cf4fdae5be46cca67387e9cfdff118276085f23ef
-
SHA512
693ab862c7e3c5dad3ca3d44bbc4a5a4c2391ff558e02e86e4c1d7d1fa7c00b4acf1c426ca619dea2b422997caaf1f0ecba37ec0ffca19edaca297005c9ad861
Score10/10-
Blocklisted process makes network request
-
Drops file in System32 directory
-
Enumerates physical storage devices
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
MITRE ATT&CK Matrix
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation