General

  • Target

    d23b6087f9c63fee7bf5d8e620cf88ca2c38fe8ee342deed923d705fa9b6d68c

  • Size

    83KB

  • Sample

    220115-cngmmaccfk

  • MD5

    0fb282d8f11fe890f0c5002103c2efc6

  • SHA1

    146f23d0fc875cf8e9d8602f0edf4ebfd5263fb3

  • SHA256

    d23b6087f9c63fee7bf5d8e620cf88ca2c38fe8ee342deed923d705fa9b6d68c

  • SHA512

    e98270035d00d3a30e4a2dd7869ed8f50e8587f62e17874dfb287cfd129cc8f4b0bcad88adccd320d8f4d9776a6b579d44834ddde69bdf931f378bfc21c046ec

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://mail.emilyanncain.com/cgi-bin/A7NT3ENvn/

xlm40.dropper

https://wordpress.baishuweb.com/wp-includes/10q0ice6/

xlm40.dropper

http://monorailegypt.com/wp-admin/6uBf9CCfZRMh/

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://mail.emilyanncain.com/cgi-bin/A7NT3ENvn/

Targets

    • Target

      d23b6087f9c63fee7bf5d8e620cf88ca2c38fe8ee342deed923d705fa9b6d68c

    • Size

      83KB

    • MD5

      0fb282d8f11fe890f0c5002103c2efc6

    • SHA1

      146f23d0fc875cf8e9d8602f0edf4ebfd5263fb3

    • SHA256

      d23b6087f9c63fee7bf5d8e620cf88ca2c38fe8ee342deed923d705fa9b6d68c

    • SHA512

      e98270035d00d3a30e4a2dd7869ed8f50e8587f62e17874dfb287cfd129cc8f4b0bcad88adccd320d8f4d9776a6b579d44834ddde69bdf931f378bfc21c046ec

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • suricata: ET MALWARE W32/Emotet CnC Beacon 3

      suricata: ET MALWARE W32/Emotet CnC Beacon 3

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks