Analysis

  • max time kernel
    92s
  • max time network
    112s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    29-01-2021 00:51

General

  • Target

    Invoice_365882.exe

  • Size

    556KB

  • MD5

    6bf6dd00173529e902af9c6d5410e8e6

  • SHA1

    260f4760fb41b6c2da3e9dccc166e165fa3a83a9

  • SHA256

    c3826a99a49c1b4954eeb12f1db7b4676f341453c6f52e2f2e25c11a60a69743

  • SHA512

    70b20a9458d65db99d6838f7ed194f063df1ae939dd37f8383b3bce0c15a8a265dff15491b24a842df9bde1160d309e5970296c2926be560922cdbc7461450d0

Malware Config

Extracted

Family

emotet

Botnet

Epoch2

C2

104.193.103.61:80

104.131.123.136:443

5.196.108.189:8080

121.124.124.40:7080

87.106.139.101:8080

213.196.135.145:80

50.35.17.13:80

38.18.235.242:80

24.43.32.186:80

82.80.155.43:80

103.86.49.11:8080

113.61.66.94:80

24.137.76.62:80

187.49.206.134:80

42.200.107.142:80

24.179.13.119:80

93.147.212.206:80

108.46.29.236:80

105.186.233.33:80

37.139.21.175:8080

rsa_pubkey.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Emotet Payload 3 IoCs

    Detects Emotet payload in memory.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Invoice_365882.exe
    "C:\Users\Admin\AppData\Local\Temp\Invoice_365882.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:504

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/504-2-0x00000000004E0000-0x00000000004F2000-memory.dmp
    Filesize

    72KB

  • memory/504-3-0x0000000000510000-0x0000000000520000-memory.dmp
    Filesize

    64KB

  • memory/504-4-0x00000000001E0000-0x00000000001EF000-memory.dmp
    Filesize

    60KB