6258788652974080.zip

General
Target

6258788652974080.zip

Size

151KB

Sample

210916-nw243sdcb9

Score
10 /10
MD5

bb520a8083cafb2745bbdc8cec248c6d

SHA1

dd379438dfe3fc791de13edd24f3698019d9b670

SHA256

7f78a78612fecd565ef1c3125ad1df1c9bdd210d4f97a0828c49941ad159cb68

SHA512

e549f114db47c0cdc5c5254be0a5cc64f733b98a26c5b1af328599dc2a8a7982289e5e09e4c933f4fc435dbbcc0b98c4fda7401c86a53ee9062072f589232275

Malware Config

Extracted

Family emotet
Botnet Epoch2
C2

124.240.198.66:80

186.75.241.230:80

181.143.194.138:443

45.79.188.67:8080

77.237.248.136:8080

185.142.236.163:443

63.142.253.122:8080

178.254.6.27:7080

190.211.207.11:443

78.188.105.159:21

182.176.106.43:995

178.79.161.166:443

206.189.98.125:8080

87.230.19.21:8080

80.11.163.139:443

101.187.237.217:20

190.18.146.70:80

86.98.25.30:53

92.222.125.16:7080

186.4.172.5:443

169.239.182.217:8080

189.209.217.49:80

104.236.246.93:8080

190.228.72.244:53

88.247.163.44:80

45.123.3.54:443

91.205.215.66:8080

190.106.97.230:443

199.19.237.192:80

186.4.172.5:20

94.205.247.10:80

104.131.11.150:8080

144.139.247.220:80

119.15.153.237:80

173.212.203.26:8080

136.243.177.26:8080

5.196.74.210:8080

85.104.59.244:20

190.186.203.55:80

187.144.189.58:50000

78.24.219.147:8080

186.4.172.5:8080

46.105.131.87:80

149.167.86.174:990

222.214.218.192:8080

88.156.97.210:80

185.94.252.13:443

190.226.44.20:21

217.145.83.44:80

80.11.163.139:21

rsa_pubkey.plain
Targets
Target

d08df2a4dd3c1f2b8f99a541acf61f088f5659caf27da9472205ac2ea2d47790

MD5

591d2b97f834d2c95667850564e8fbe2

Filesize

474KB

Score
10 /10
SHA1

cf28700496e977e7a4e01c02f20b954a01d89878

SHA256

d08df2a4dd3c1f2b8f99a541acf61f088f5659caf27da9472205ac2ea2d47790

SHA512

1a112bde7e667a85706d67c89663d2ec4e2dfe9bfc2a861f42d0761e633d45c93041363cffa49ed45de249e9c19373c497f8d2900288c80d36a74d14eb80e89c

Tags

Signatures

  • Emotet

    Description

    Emotet is a trojan that is primarily spread through spam emails.

    Tags

  • Drops file in System32 directory

Related Tasks

MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
          Execution
            Exfiltration
              Impact
                Initial Access
                  Lateral Movement
                    Persistence
                      Privilege Escalation
                        Tasks

                        static1

                        9/10

                        behavioral1

                        10/10

                        behavioral2

                        10/10