657.exe

General
Target

657.exe

Size

361KB

Sample

210303-m4eh817ejj

Score
10 /10
MD5

55cb6ea4c374a5c28ddb60754f7fa47d

SHA1

414ccc751051dde96679662b8067f8a13d722047

SHA256

004222c4f6b6df52371132843f2b7cff9d390b308438791df50fc9a9a38d47bd

SHA512

9b8a9eeafc0120628af504e086b5edf7eb627172a7d3c956da2913f2d69b8b99d041e7c4b2c5c852e57c37f62e9dabfc818d45ddc23935d3ba85e62076d6ff55

Malware Config

Extracted

Family emotet
Botnet Epoch1
C2

181.123.0.125:80

119.159.150.176:443

184.69.214.94:20

80.240.141.141:7080

185.187.198.10:8080

46.41.134.46:8080

178.249.187.151:8080

217.199.160.224:8080

186.83.133.253:8080

23.92.22.225:7080

212.71.237.140:8080

190.221.50.210:8080

187.199.158.226:443

185.86.148.222:8080

200.58.171.51:80

77.245.101.134:8080

201.163.74.202:443

203.25.159.3:8080

183.82.97.25:80

51.15.8.192:8080

5.77.13.70:80

181.36.42.205:443

178.79.163.131:8080

217.113.27.158:443

62.75.143.100:7080

189.187.141.15:50000

77.55.211.77:8080

81.169.140.14:443

87.106.77.40:7080

114.79.134.129:443

217.199.175.216:8080

149.62.173.247:8080

46.29.183.211:8080

200.21.90.6:8080

187.188.166.192:80

123.168.4.66:22

190.230.60.129:80

138.68.106.4:7080

181.167.53.209:80

190.200.64.180:7080

190.104.253.234:990

119.92.51.40:8080

62.75.160.178:8080

186.0.95.172:80

109.169.86.13:8080

151.80.142.33:80

119.59.124.163:8080

86.42.166.147:80

71.244.60.231:7080

50.28.51.143:8080

rsa_pubkey.plain
Targets
Target

657.exe

MD5

55cb6ea4c374a5c28ddb60754f7fa47d

Filesize

361KB

Score
10 /10
SHA1

414ccc751051dde96679662b8067f8a13d722047

SHA256

004222c4f6b6df52371132843f2b7cff9d390b308438791df50fc9a9a38d47bd

SHA512

9b8a9eeafc0120628af504e086b5edf7eb627172a7d3c956da2913f2d69b8b99d041e7c4b2c5c852e57c37f62e9dabfc818d45ddc23935d3ba85e62076d6ff55

Tags

Signatures

  • Emotet

    Description

    Emotet is a trojan that is primarily spread through spam emails.

    Tags

  • Drops file in System32 directory

Related Tasks

MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
          Execution
            Exfiltration
              Impact
                Initial Access
                  Lateral Movement
                    Persistence
                      Privilege Escalation
                        Tasks

                        static1

                        9/10

                        behavioral1

                        10/10

                        behavioral2

                        10/10