General

  • Target

    Report.xlsm

  • Size

    69KB

  • Sample

    220226-lyxk9sach5

  • MD5

    19d026b39be0497f32b2b81a4da9f2f2

  • SHA1

    a5da94930f5049fd16617ef1b25095cd56015b2a

  • SHA256

    d9420b36f3f63a67c68f30b55881c0128cf680306e228a22ba7b6fd3d4a3ad7e

  • SHA512

    c24e931337fe91be874990f82e6f1e91727edb516e0f3717fc52eeca14c4bc34ed035845ff21890f7ccf6c2a2dfc9e56eda0af787fe02f130dd8281a47de3ce2

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://vasilestudio.com/wp-admin/pZ1vbd5Z/

Extracted

Family

emotet

Botnet

Epoch4

C2

169.197.131.16:8080

195.154.253.60:8080

152.89.239.34:443

216.158.226.206:443

159.65.88.10:8080

209.126.98.206:8080

158.69.222.101:443

173.212.193.249:8080

185.157.82.211:8080

81.0.236.90:443

103.75.201.2:443

46.55.222.11:443

159.8.59.82:8080

207.38.84.195:8080

50.116.54.215:443

79.172.212.216:8080

212.237.17.99:8080

212.24.98.99:8080

178.79.147.66:8080

51.254.140.238:7080

eck1.plain
ecs1.plain

Targets

    • Target

      Report.xlsm

    • Size

      69KB

    • MD5

      19d026b39be0497f32b2b81a4da9f2f2

    • SHA1

      a5da94930f5049fd16617ef1b25095cd56015b2a

    • SHA256

      d9420b36f3f63a67c68f30b55881c0128cf680306e228a22ba7b6fd3d4a3ad7e

    • SHA512

      c24e931337fe91be874990f82e6f1e91727edb516e0f3717fc52eeca14c4bc34ed035845ff21890f7ccf6c2a2dfc9e56eda0af787fe02f130dd8281a47de3ce2

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks