Analysis

  • max time kernel
    144s
  • max time network
    147s
  • platform
    windows10_x64
  • resource
    win10-en
  • submitted
    14-09-2021 07:46

General

  • Target

    5c65f15b05c5780592e1342f40ca46b146d3b5802a554cd8a86838053b4999cb.exe

  • Size

    300KB

  • MD5

    965eefd9363749c9b59f2c0e4bf4a996

  • SHA1

    cbfd4ad95bc4330b677e64dd15db5cbb4784caf9

  • SHA256

    5c65f15b05c5780592e1342f40ca46b146d3b5802a554cd8a86838053b4999cb

  • SHA512

    3d89d78e5a1fba3dd77271e6c83c28edc9e250fe60f3be0fb685b2565c92ff6c9c169d1d65c019b6e81a64921580364778bb5e690851d357eb6f4fadd144aba0

Malware Config

Extracted

Family

emotet

Botnet

Epoch3

C2

173.94.215.84:80

85.25.207.108:8080

178.128.14.92:8080

60.125.114.64:443

181.126.54.234:80

157.7.164.178:8081

95.216.205.155:8080

216.75.37.196:8080

179.62.238.49:80

71.57.180.213:80

172.96.190.154:8080

112.78.142.170:80

178.238.232.46:443

177.144.130.105:443

105.209.235.113:8080

46.105.131.68:8080

185.86.148.68:443

143.95.101.72:8080

75.127.14.170:8080

168.0.97.6:80

rsa_pubkey.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Emotet Payload 2 IoCs

    Detects Emotet payload in memory.

  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5c65f15b05c5780592e1342f40ca46b146d3b5802a554cd8a86838053b4999cb.exe
    "C:\Users\Admin\AppData\Local\Temp\5c65f15b05c5780592e1342f40ca46b146d3b5802a554cd8a86838053b4999cb.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:4008

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4008-115-0x0000000002330000-0x000000000233C000-memory.dmp
    Filesize

    48KB

  • memory/4008-118-0x0000000002320000-0x0000000002329000-memory.dmp
    Filesize

    36KB