General

  • Target

    3dac84aa8db00f20e969a61312ee55578cd4dbbf6ec0e4285878d301d3271acf

  • Size

    83KB

  • Sample

    220114-h8ftqafbdj

  • MD5

    ea061c58b645e00b934085f3d67587f1

  • SHA1

    38400c60792c070b034cd4404f89cefc6b84eeef

  • SHA256

    3dac84aa8db00f20e969a61312ee55578cd4dbbf6ec0e4285878d301d3271acf

  • SHA512

    a79074c8bf8dad84a5aa8bac3784bf3e23f98bd294ef45e5ae8bcc6fd7e9eba551e554fdfd5b502f57a28a262eca5643a98aa6325cdac893fca7289b4f48e17b

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://adi.iswks.com/assets/hO1v71pqfNN/

xlm40.dropper

http://kopbhawan.com/mdphht/fwqEBVQlJXHayt/

xlm40.dropper

http://towardsun.net/admin/dcg3jSLkPuYsQ5xB/

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://adi.iswks.com/assets/hO1v71pqfNN/

Targets

    • Target

      3dac84aa8db00f20e969a61312ee55578cd4dbbf6ec0e4285878d301d3271acf

    • Size

      83KB

    • MD5

      ea061c58b645e00b934085f3d67587f1

    • SHA1

      38400c60792c070b034cd4404f89cefc6b84eeef

    • SHA256

      3dac84aa8db00f20e969a61312ee55578cd4dbbf6ec0e4285878d301d3271acf

    • SHA512

      a79074c8bf8dad84a5aa8bac3784bf3e23f98bd294ef45e5ae8bcc6fd7e9eba551e554fdfd5b502f57a28a262eca5643a98aa6325cdac893fca7289b4f48e17b

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • suricata: ET MALWARE W32/Emotet CnC Beacon 3

      suricata: ET MALWARE W32/Emotet CnC Beacon 3

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks