General

  • Target

    Address Update, NY.xls

  • Size

    106KB

  • Sample

    220329-vggyxscfcr

  • MD5

    a87543e552ee059b2c1a68c26529579b

  • SHA1

    76b384a0f3f314d0b6b26d7ce3a060c2e5a1f424

  • SHA256

    ab01a85308cf2fce06a2402287df4d947b0a89250d30d7289c0b63a07eb00503

  • SHA512

    55f1e968b37c1040782c8b6559a215cde9ba5bad89ebe4d0dbb94b56e6267789e585dc63c0ab369703adca6ab0bfe5ce56acb993a3986fa6392ab826f891a80d

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://fccatinsaat.com/wp-content/Cw3aR6792f/

Extracted

Family

emotet

Botnet

Epoch4

C2

159.203.141.156:8080

79.143.187.147:443

189.232.46.161:443

51.91.76.89:8080

119.193.124.41:7080

176.104.106.96:8080

1.234.21.73:7080

82.165.152.127:8080

167.172.253.162:8080

153.126.146.25:7080

216.158.226.206:443

103.75.201.2:443

188.44.20.25:443

101.50.0.91:8080

159.65.88.10:8080

176.56.128.118:443

72.15.201.15:8080

203.114.109.124:443

212.237.17.99:8080

192.99.251.50:443

eck1.plain
ecs1.plain

Targets

    • Target

      Address Update, NY.xls

    • Size

      106KB

    • MD5

      a87543e552ee059b2c1a68c26529579b

    • SHA1

      76b384a0f3f314d0b6b26d7ce3a060c2e5a1f424

    • SHA256

      ab01a85308cf2fce06a2402287df4d947b0a89250d30d7289c0b63a07eb00503

    • SHA512

      55f1e968b37c1040782c8b6559a215cde9ba5bad89ebe4d0dbb94b56e6267789e585dc63c0ab369703adca6ab0bfe5ce56acb993a3986fa6392ab826f891a80d

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • suricata: ET MALWARE W32/Emotet CnC Beacon 3

      suricata: ET MALWARE W32/Emotet CnC Beacon 3

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks