General

  • Target

    60b238f32cb7814cf644f6b8d9d6d6576462b0b5ef10c03d608181ac88fe57f6_60b238f32cb7814cf644f6b8d9d6d6576462b0b5ef10c03d608181ac88fe57f6.xls

  • Size

    30KB

  • Sample

    211216-2gvncachh8

  • MD5

    d67193e7b4806640105a117a020ab6b0

  • SHA1

    fdf3b9a1c83e68cc0dd69c80015822a044cbdc5a

  • SHA256

    60b238f32cb7814cf644f6b8d9d6d6576462b0b5ef10c03d608181ac88fe57f6

  • SHA512

    e3490a1d7f3648261d2e20d99f89e32871f171dc6bce49566bf02d1b7cecdf088f2bfc55de9477bc30beea3785661d7ad64f528803fb0859524fdc268e6ec937

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://87.251.85.100/PP/pp.html

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://87.251.85.100/PP/PP.PNG

Extracted

Family

emotet

Botnet

Epoch5

C2

209.239.112.82:8080

116.124.128.206:8080

45.63.5.129:443

128.199.192.135:8080

51.178.61.60:443

168.197.250.14:80

177.72.80.14:7080

51.210.242.234:8080

142.4.219.173:8080

78.47.204.80:443

78.46.73.125:443

37.44.244.177:8080

37.59.209.141:8080

104.131.62.48:8080

190.90.233.66:443

185.148.168.220:8080

185.148.168.15:8080

62.171.178.147:8080

191.252.103.16:80

54.38.242.185:443

eck1.plain
ecs1.plain

Targets

    • Target

      60b238f32cb7814cf644f6b8d9d6d6576462b0b5ef10c03d608181ac88fe57f6_60b238f32cb7814cf644f6b8d9d6d6576462b0b5ef10c03d608181ac88fe57f6.xls

    • Size

      30KB

    • MD5

      d67193e7b4806640105a117a020ab6b0

    • SHA1

      fdf3b9a1c83e68cc0dd69c80015822a044cbdc5a

    • SHA256

      60b238f32cb7814cf644f6b8d9d6d6576462b0b5ef10c03d608181ac88fe57f6

    • SHA512

      e3490a1d7f3648261d2e20d99f89e32871f171dc6bce49566bf02d1b7cecdf088f2bfc55de9477bc30beea3785661d7ad64f528803fb0859524fdc268e6ec937

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks