Resubmissions

20-03-2022 09:48

220320-lsxzvabhap 10

20-03-2022 09:44

220320-lqp68abfb8 10

General

  • Target

    4d6ef2e81523b9f530939efd7a38a55ac6f01fc53699fd7c14e61cf1ce28749d

  • Size

    585KB

  • Sample

    220320-lsxzvabhap

  • MD5

    d608af4dfb3128271803938c98721465

  • SHA1

    6b244c32f7f2f0e168ebb7e76302206852a4dd62

  • SHA256

    4d6ef2e81523b9f530939efd7a38a55ac6f01fc53699fd7c14e61cf1ce28749d

  • SHA512

    9d38c447798541c1293485214c5d46aba2da315f49039eee8a93e48f5fd69664caa0755bca7a7a3714f556024def2ee4cb5fb1c8625b4ce5fffa4be0de780b52

Malware Config

Extracted

Family

emotet

Botnet

Epoch4

C2

149.56.128.192:443

120.50.40.183:80

160.16.218.63:8080

217.182.25.250:8080

119.193.124.41:7080

103.75.201.2:443

195.201.151.129:8080

131.100.24.231:80

159.65.88.10:8080

1.234.21.73:7080

5.9.116.246:8080

103.75.201.4:443

176.104.106.96:8080

138.185.72.26:8080

212.237.17.99:8080

72.15.201.15:8080

103.43.46.182:443

207.38.84.195:8080

46.55.222.11:443

1.234.2.232:8080

eck1.plain
ecs1.plain

Targets

    • Target

      4d6ef2e81523b9f530939efd7a38a55ac6f01fc53699fd7c14e61cf1ce28749d

    • Size

      585KB

    • MD5

      d608af4dfb3128271803938c98721465

    • SHA1

      6b244c32f7f2f0e168ebb7e76302206852a4dd62

    • SHA256

      4d6ef2e81523b9f530939efd7a38a55ac6f01fc53699fd7c14e61cf1ce28749d

    • SHA512

      9d38c447798541c1293485214c5d46aba2da315f49039eee8a93e48f5fd69664caa0755bca7a7a3714f556024def2ee4cb5fb1c8625b4ce5fffa4be0de780b52

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • PlugX

      PlugX is a RAT (Remote Access Trojan) that has been around since 2008.

    • PlugX Rat Payload

    • suricata: ET MALWARE W32/Emotet CnC Beacon 3

      suricata: ET MALWARE W32/Emotet CnC Beacon 3

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Detected potential entity reuse from brand microsoft.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks