General
-
Target
995b0366f1af39913abd334fd84c7b3ab3eb4a2367ef31cb568bc28f07dd4da6
-
Size
120KB
-
Sample
220520-1b1fzaghdj
-
MD5
2618712fe98fde7eba4fd8b29420187f
-
SHA1
65c8d321c30ef67241a482addacb06f556c77697
-
SHA256
995b0366f1af39913abd334fd84c7b3ab3eb4a2367ef31cb568bc28f07dd4da6
-
SHA512
6b3a8335ce032e71d56e9e74e03391d17492a2625ee1be392da505df898f585aa549ec544b1f05f4c45d82ad5842e6edfa33da2eb52d79c5ce1db31895fd2c9b
Static task
static1
Behavioral task
behavioral1
Sample
sample.doc
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
sample.doc
Resource
win10v2004-20220414-en
Malware Config
Extracted
http://www.riserproperty.com/wp-content/SMXB/
http://laurenebohn.com/bGOHy/8qa07472/
http://lezliedavis.com/swift/5TQW6sf32736/
http://cityplanter.co.uk/zy0b9r0s/lTZlc101auo37/
http://farooquie.com/wp-admin/da52f6268411/
https://onejmd.com/wp-content/xmO/
https://s1.finmsb.com/uc_autoscripts/AcpPvTthOX/
Extracted
emotet
Epoch3
190.136.179.102:80
97.107.135.148:8080
94.102.209.63:7080
162.144.42.60:8080
81.214.253.80:443
87.106.231.60:8080
107.161.30.122:8080
66.61.94.36:80
139.59.12.63:8080
203.153.216.178:7080
178.33.167.120:8080
179.62.238.49:80
50.116.78.109:8080
74.208.173.91:8080
113.161.148.81:80
179.5.118.12:80
202.5.47.71:80
91.83.93.103:443
181.113.229.139:443
41.185.29.128:8080
37.205.9.252:7080
197.232.36.108:80
91.75.75.46:80
105.209.235.113:8080
181.137.229.1:80
172.105.78.244:8080
157.7.164.178:8081
190.55.186.229:80
192.163.221.191:8080
37.187.100.220:7080
5.79.70.250:8080
192.241.220.183:8080
168.0.97.6:80
46.32.229.152:8080
115.78.11.155:80
68.183.233.80:8080
190.96.15.50:80
175.29.183.2:80
118.101.24.148:80
157.245.138.101:7080
95.216.205.155:8080
46.105.131.68:8080
188.251.213.180:443
190.53.144.120:80
143.95.101.72:8080
88.249.181.198:443
2.144.244.204:443
177.32.8.85:80
190.212.140.6:80
185.86.148.68:443
54.38.143.245:8080
190.190.15.20:80
189.39.32.161:80
186.227.146.102:80
185.142.236.163:443
201.213.177.139:80
134.209.193.138:443
190.164.75.175:80
77.74.78.80:443
198.57.203.63:8080
103.80.51.61:8080
197.221.158.162:80
173.94.215.84:80
115.79.195.246:80
181.122.154.240:80
172.96.190.154:8080
82.239.200.118:80
81.17.93.134:80
201.235.10.215:80
178.87.171.199:80
24.26.151.3:80
75.127.14.170:8080
71.57.180.213:80
185.208.226.142:8080
177.144.130.105:443
31.146.61.34:80
60.125.114.64:443
188.0.135.237:80
181.126.54.234:80
162.249.220.190:80
220.254.198.228:443
177.94.227.143:80
113.203.250.121:443
37.46.129.215:8080
1.54.67.22:80
45.182.161.17:80
86.98.143.163:80
51.38.201.19:7080
192.210.217.94:8080
195.201.56.70:8080
Targets
-
-
Target
sample
-
Size
229KB
-
MD5
c890c90cd1daa9f30a77a791945e812c
-
SHA1
707f2c30ddd2f4196b67854fb3e621ed6ee3985e
-
SHA256
8d1ed93b4b818cdc5fa85348c03845e9dd6a15c09ba7b89d5430512b44cf58ad
-
SHA512
c500e2223b8a95eff88d3a2f3bb7ca3648be6a2a90ddaaf4b1f0ec08a079444fc861666819f08350366712010b55499d4a7050e5c230f8bb7ff7c7bed4f51ee6
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
suricata: ET MALWARE Win32/Emotet CnC Activity (POST) M9
suricata: ET MALWARE Win32/Emotet CnC Activity (POST) M9
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Drops file in System32 directory
-