General

  • Target

    e3-0126.zip

  • Size

    127KB

  • Sample

    210126-wasjt2ra4n

  • MD5

    b534a645756a366580ec32f0c7950153

  • SHA1

    ef084bad7d7538bdb067f1ba4058cee61586c4a0

  • SHA256

    aa01d9951003a150e3d597fb6fa9e7fb91513ea2ddfa81096c3d10199ca78c70

  • SHA512

    c786eec483d6dbeaa01700b462eb024e1a18c34e1bbc5549f4dcc6190365c033a65f4868dbbe1a93edfc2f8cc686eec8f49332666f62535b9c6cf5a6b7b693d9

Malware Config

Extracted

Family

emotet

Botnet

Epoch3

C2

190.55.186.229:80

203.157.152.9:7080

157.245.145.87:443

109.99.146.210:8080

116.202.10.123:8080

172.96.190.154:8080

163.53.204.180:443

190.107.118.125:80

91.93.3.85:8080

185.142.236.163:443

115.79.195.246:80

120.51.34.254:80

192.210.217.94:8080

198.20.228.9:8080

91.75.75.46:80

54.38.143.245:8080

161.49.84.2:80

162.144.145.58:8080

178.33.167.120:8080

201.193.160.196:80

rsa_pubkey.plain

Targets

    • Target

      aretmrytntm.sqj

    • Size

      330KB

    • MD5

      824fd8be213246bef034dffc574a9579

    • SHA1

      8254291e676e83e7ec92370e67ad0a08014ab52b

    • SHA256

      a7979541a188f04dfa7f2981e0dcabc700da73422ce7ce43c9fce5896eb5085c

    • SHA512

      51e481347ea6d415657c8f1bd05440d0b01dfe1e42b1df93d0afa0a0b6ee0e7d12cd4d017f6234863554da853f2ab309c25fdf3952eb432a756a31a1c8cb6f98

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Blocklisted process makes network request

    • Drops file in System32 directory

    • Enumerates physical storage devices

      Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks