6982c7188a094607371819a36f28c4097e10f640cd7968daede62b4488aba3a9

General
Target

6982c7188a094607371819a36f28c4097e10f640cd7968daede62b4488aba3a9

Size

84KB

Sample

210509-6xr8zehajj

Score
10 /10
MD5

9fd626edde376c3555766d3128b73a7a

SHA1

2fc839eeaf9fbb4a0bae82793617a32d9d5cf64f

SHA256

6982c7188a094607371819a36f28c4097e10f640cd7968daede62b4488aba3a9

SHA512

372180a8a1c0bd9a223c64b718229fb371151b8276bfd13c083eb941eb1e764f6d23f51275c13a558af39b6597657f9cebc0cf2870465c7db36dad92872ec806

Malware Config

Extracted

Family emotet
Botnet Epoch2
C2

195.76.232.114:80

82.223.70.24:8080

45.33.49.124:443

136.243.205.112:7080

110.145.77.103:80

74.208.45.104:8080

24.94.237.248:80

186.208.123.210:443

67.235.68.222:80

209.151.248.242:8080

200.41.121.90:80

5.196.74.210:8080

201.173.217.124:443

185.155.20.82:80

139.130.242.43:80

114.145.241.208:80

168.235.67.138:7080

162.241.92.219:8080

98.156.206.153:80

101.187.97.173:80

95.213.236.64:8080

113.160.130.116:8443

46.105.131.87:80

104.131.44.150:8080

95.128.43.213:8080

68.44.137.144:443

178.20.74.212:80

60.250.78.22:443

87.106.136.232:8080

113.61.66.94:80

87.106.139.101:8080

58.171.38.26:80

193.80.169.64:80

91.205.215.66:443

37.187.72.193:8080

104.236.246.93:8080

169.239.182.217:8080

50.116.86.205:8080

196.179.249.218:8080

60.130.173.117:80

85.152.174.56:80

210.56.10.58:80

211.63.71.72:8080

58.177.172.160:80

93.51.50.171:8080

185.94.252.104:443

62.138.26.28:8080

98.15.140.226:80

78.189.165.52:8080

31.31.77.83:443

rsa_pubkey.plain
Targets
Target

6982c7188a094607371819a36f28c4097e10f640cd7968daede62b4488aba3a9

MD5

9fd626edde376c3555766d3128b73a7a

Filesize

84KB

Score
10/10
SHA1

2fc839eeaf9fbb4a0bae82793617a32d9d5cf64f

SHA256

6982c7188a094607371819a36f28c4097e10f640cd7968daede62b4488aba3a9

SHA512

372180a8a1c0bd9a223c64b718229fb371151b8276bfd13c083eb941eb1e764f6d23f51275c13a558af39b6597657f9cebc0cf2870465c7db36dad92872ec806

Tags

Signatures

  • Emotet

    Description

    Emotet is a trojan that is primarily spread through spam emails.

    Tags

Related Tasks

MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
          Discovery
            Execution
              Exfiltration
                Impact
                  Initial Access
                    Lateral Movement
                      Persistence
                        Privilege Escalation
                          Tasks

                          static1

                          behavioral1

                          10/10

                          behavioral2

                          10/10