General

  • Target

    95f41e9b8a4f4e066d9973936f9197fc1ef50c8e3349809c1c95c21b5cc361a5

  • Size

    870KB

  • Sample

    220302-ert38sedek

  • MD5

    d3b829a5765f6f06d86a2a3f1278b9e6

  • SHA1

    66e27d00dff7265aeba5f6bbafe2b39b91ff2db2

  • SHA256

    95f41e9b8a4f4e066d9973936f9197fc1ef50c8e3349809c1c95c21b5cc361a5

  • SHA512

    a803ee8441492689196d1d38b559bb37b680451cd865de01f8a34d84f90c305d8da27bec0d55d84f2e223ad835b201936b2c0909d1640ce5de4a2ad83ea7b74d

Malware Config

Extracted

Family

emotet

Botnet

Epoch2

C2

184.180.181.202:80

169.50.76.149:8080

162.241.140.129:8080

104.131.123.136:443

194.187.133.160:443

71.15.245.148:8080

37.139.21.175:8080

104.131.11.150:443

118.83.154.64:443

24.137.76.62:80

79.137.83.50:443

69.206.132.149:80

110.142.236.207:80

123.176.25.234:80

120.150.60.189:80

209.54.13.14:80

95.213.236.64:8080

209.141.54.221:8080

96.245.227.43:80

87.106.139.101:8080

rsa_pubkey.plain

Targets

    • Target

      95f41e9b8a4f4e066d9973936f9197fc1ef50c8e3349809c1c95c21b5cc361a5

    • Size

      870KB

    • MD5

      d3b829a5765f6f06d86a2a3f1278b9e6

    • SHA1

      66e27d00dff7265aeba5f6bbafe2b39b91ff2db2

    • SHA256

      95f41e9b8a4f4e066d9973936f9197fc1ef50c8e3349809c1c95c21b5cc361a5

    • SHA512

      a803ee8441492689196d1d38b559bb37b680451cd865de01f8a34d84f90c305d8da27bec0d55d84f2e223ad835b201936b2c0909d1640ce5de4a2ad83ea7b74d

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • suricata: ET MALWARE Win32/Emotet CnC Activity (POST) M11

      suricata: ET MALWARE Win32/Emotet CnC Activity (POST) M11

    • Emotet Payload

      Detects Emotet payload in memory.

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks