General

  • Target

    fb51ebfd72054de8cbd7f74a05ce8d3cce650a9224c21504077cce9e86ae6fd1

  • Size

    83KB

  • Sample

    220114-tdz5nahdcp

  • MD5

    48428b9169c6e692374591bea2b72937

  • SHA1

    cea05aae8d1a2b46c22266243d133da0453df4e8

  • SHA256

    fb51ebfd72054de8cbd7f74a05ce8d3cce650a9224c21504077cce9e86ae6fd1

  • SHA512

    0ab2e83877d5c6d4a0632eeacaffdf54bc04e493ec47f992ddc0337a8ba77795e03e524144633a1e211929260a52069e3a32b169312bf91f1325e4c5dc5f1542

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://therecyclingmachine.com/wp-admin/LzpOZSlkq90fYT1/

xlm40.dropper

http://zhongmaifangwu.com/TEST777/3U4Un0u/

xlm40.dropper

http://chicagocloudgroup.com/wp-content/updraft/OKXV/

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://therecyclingmachine.com/wp-admin/LzpOZSlkq90fYT1/

xlm40.dropper

http://zhongmaifangwu.com/TEST777/3U4Un0u/

Targets

    • Target

      fb51ebfd72054de8cbd7f74a05ce8d3cce650a9224c21504077cce9e86ae6fd1

    • Size

      83KB

    • MD5

      48428b9169c6e692374591bea2b72937

    • SHA1

      cea05aae8d1a2b46c22266243d133da0453df4e8

    • SHA256

      fb51ebfd72054de8cbd7f74a05ce8d3cce650a9224c21504077cce9e86ae6fd1

    • SHA512

      0ab2e83877d5c6d4a0632eeacaffdf54bc04e493ec47f992ddc0337a8ba77795e03e524144633a1e211929260a52069e3a32b169312bf91f1325e4c5dc5f1542

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • suricata: ET MALWARE W32/Emotet CnC Beacon 3

      suricata: ET MALWARE W32/Emotet CnC Beacon 3

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks