General

  • Target

    c5c504ebd7f8f552f320fc37c51c459b461516d7c78cb696df151a8d7a3f3aaa.xlsm

  • Size

    173KB

  • Sample

    220225-xajkaaacfk

  • MD5

    f5dcdef1591218656fea95b1a5a612e3

  • SHA1

    8bc34e334c863311aef836d97f2c8ee4b7f612c0

  • SHA256

    c5c504ebd7f8f552f320fc37c51c459b461516d7c78cb696df151a8d7a3f3aaa

  • SHA512

    af126d7899af895317611490b858c44f818ed9a353c5b6cec3678c20565c4782ed0e27bf067147dcaf60aeed7182d9905a1cf02fa5a5fc194d1e2ff65e0bda5d

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://realitevirtuelleguadeloupe.com/warp-visa/xogkV/

Extracted

Family

emotet

Botnet

Epoch4

C2

169.197.131.16:8080

195.154.253.60:8080

152.89.239.34:443

216.158.226.206:443

159.65.88.10:8080

209.126.98.206:8080

158.69.222.101:443

173.212.193.249:8080

185.157.82.211:8080

81.0.236.90:443

103.75.201.2:443

46.55.222.11:443

159.8.59.82:8080

207.38.84.195:8080

50.116.54.215:443

79.172.212.216:8080

212.237.17.99:8080

212.24.98.99:8080

178.79.147.66:8080

51.254.140.238:7080

eck1.plain
ecs1.plain

Targets

    • Target

      c5c504ebd7f8f552f320fc37c51c459b461516d7c78cb696df151a8d7a3f3aaa.xlsm

    • Size

      173KB

    • MD5

      f5dcdef1591218656fea95b1a5a612e3

    • SHA1

      8bc34e334c863311aef836d97f2c8ee4b7f612c0

    • SHA256

      c5c504ebd7f8f552f320fc37c51c459b461516d7c78cb696df151a8d7a3f3aaa

    • SHA512

      af126d7899af895317611490b858c44f818ed9a353c5b6cec3678c20565c4782ed0e27bf067147dcaf60aeed7182d9905a1cf02fa5a5fc194d1e2ff65e0bda5d

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • suricata: ET MALWARE W32/Emotet CnC Beacon 3

      suricata: ET MALWARE W32/Emotet CnC Beacon 3

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks