9cf2c56e_by_Libranalysis

General
Target

9cf2c56e_by_Libranalysis

Size

419KB

Sample

210506-wxbv22bsms

Score
10 /10
MD5

9cf2c56ef2d9ed4c679013369c6bf4c0

SHA1

77a2d90daf8ccff12ba036924d49c0d57cfbc89b

SHA256

ea1025ebfb2cbc8b7ee79006a44c6c036329701015d45f6f3777e58915b83726

SHA512

824fa156c422176b7f41aeae17fe10ea40bd0cb4337a3093b76b7416add2412d6de606d12b0f50a9de0b68e92456728b4b6e1829f2c2324a667282c73a0e6598

Malware Config

Extracted

Family emotet
Botnet Epoch2
C2

47.148.241.179:80

24.204.47.87:80

80.86.91.91:8080

104.236.28.47:8080

87.106.136.232:8080

211.63.71.72:8080

113.52.123.226:7080

78.101.70.199:443

76.86.17.1:80

222.144.13.169:80

47.155.214.239:80

181.143.126.170:80

169.239.182.217:8080

181.126.70.117:80

209.137.209.84:443

207.177.72.129:8080

37.139.21.175:8080

149.202.153.252:8080

108.6.170.195:80

37.187.72.193:8080

190.220.19.82:443

206.81.10.215:8080

92.222.216.44:8080

104.131.44.150:8080

103.86.49.11:8080

78.186.5.109:443

62.75.187.192:8080

76.104.80.47:80

176.9.43.37:8080

31.172.240.91:8080

66.34.201.20:7080

125.207.127.86:80

85.152.174.56:80

78.189.180.107:80

23.92.16.164:8080

178.153.176.124:80

74.208.45.104:8080

177.239.160.121:80

47.156.70.145:80

217.160.182.191:8080

223.197.185.60:80

95.213.236.64:8080

190.143.39.231:80

173.73.87.96:80

46.105.131.87:80

93.147.141.5:443

105.27.155.182:80

209.146.22.34:443

174.53.195.88:80

59.20.65.102:80

rsa_pubkey.plain
Targets
Target

9cf2c56e_by_Libranalysis

MD5

9cf2c56ef2d9ed4c679013369c6bf4c0

Filesize

419KB

Score
10/10
SHA1

77a2d90daf8ccff12ba036924d49c0d57cfbc89b

SHA256

ea1025ebfb2cbc8b7ee79006a44c6c036329701015d45f6f3777e58915b83726

SHA512

824fa156c422176b7f41aeae17fe10ea40bd0cb4337a3093b76b7416add2412d6de606d12b0f50a9de0b68e92456728b4b6e1829f2c2324a667282c73a0e6598

Tags

Signatures

  • Emotet

    Description

    Emotet is a trojan that is primarily spread through spam emails.

    Tags

Related Tasks

MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
          Execution
            Exfiltration
              Impact
                Initial Access
                  Lateral Movement
                    Persistence
                      Privilege Escalation
                        Tasks

                        static1

                        8/10

                        behavioral1

                        10/10

                        behavioral2

                        10/10