General

  • Target

    d82767751280c173d75b7eac6591bcff4ee4e3e03a683cf6436635a873299daa

  • Size

    172KB

  • Sample

    220516-ttvvwaade7

  • MD5

    c3d04a3a5520a2f58516c2f0acbd4055

  • SHA1

    f97acd5a5384d81f003d382b5c3a5ac448a9bb62

  • SHA256

    d82767751280c173d75b7eac6591bcff4ee4e3e03a683cf6436635a873299daa

  • SHA512

    fd5bfb01b5f5c6d857620797ed4add60869ee662dcb5aaf721e3ee1a1fee01fcad08fd4b4b2eaa6dc626d6ac0438033f30d5affde3f12b159fdffe4bca5e41fd

Score
10/10

Malware Config

Targets

    • Target

      d82767751280c173d75b7eac6591bcff4ee4e3e03a683cf6436635a873299daa

    • Size

      172KB

    • MD5

      c3d04a3a5520a2f58516c2f0acbd4055

    • SHA1

      f97acd5a5384d81f003d382b5c3a5ac448a9bb62

    • SHA256

      d82767751280c173d75b7eac6591bcff4ee4e3e03a683cf6436635a873299daa

    • SHA512

      fd5bfb01b5f5c6d857620797ed4add60869ee662dcb5aaf721e3ee1a1fee01fcad08fd4b4b2eaa6dc626d6ac0438033f30d5affde3f12b159fdffe4bca5e41fd

    Score
    10/10
    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks