General

  • Target

    7b10abef408978ea69c704e29e2e797a

  • Size

    113KB

  • Sample

    220112-de16caahgq

  • MD5

    7b10abef408978ea69c704e29e2e797a

  • SHA1

    d5cec5db6eacae468496669bb602195e1d5b5cbd

  • SHA256

    5c2972a5491e6d8209aa42964c99ad4f8621686005fbc5e1836b4b18d165a888

  • SHA512

    ca797e6b8bb612dd4e94c36cf7f8f846014ec2b4884949c9b4d9e2901273930a0c5fc3a82ad0135226886e1e266f0afff4b051fe9a4fb8d018d4526e15c38a02

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://ordinateur.ogivart.us/editor/Qpo7OAOnbe/

Targets

    • Target

      7b10abef408978ea69c704e29e2e797a

    • Size

      113KB

    • MD5

      7b10abef408978ea69c704e29e2e797a

    • SHA1

      d5cec5db6eacae468496669bb602195e1d5b5cbd

    • SHA256

      5c2972a5491e6d8209aa42964c99ad4f8621686005fbc5e1836b4b18d165a888

    • SHA512

      ca797e6b8bb612dd4e94c36cf7f8f846014ec2b4884949c9b4d9e2901273930a0c5fc3a82ad0135226886e1e266f0afff4b051fe9a4fb8d018d4526e15c38a02

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • suricata: ET MALWARE W32/Emotet CnC Beacon 3

      suricata: ET MALWARE W32/Emotet CnC Beacon 3

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks