General

  • Target

    db03db8a52f7989dd22f3fdffe4cf86f17a036217bb5184766e8ddb10487d68b

  • Size

    47KB

  • Sample

    220521-w5zdjsecdm

  • MD5

    74ce9545d2698d29887426936dfa6d1a

  • SHA1

    8389154b0b1900cba2f37d0992e9f4c65a75cb34

  • SHA256

    db03db8a52f7989dd22f3fdffe4cf86f17a036217bb5184766e8ddb10487d68b

  • SHA512

    a112f72d658f2d75fd53c3efcc9e72712688776008c0f621ace867101ff1518a488b0c3cbfbd5ade5e1ece8a468acfba1a2f6d43d1d111732b41d0b4cdf0dd24

Malware Config

Extracted

Family

emotet

Botnet

Epoch1

C2

82.163.245.38:80

209.126.6.222:8080

5.153.250.14:8080

186.70.127.199:8090

190.128.173.10:80

190.195.129.227:8090

91.219.169.180:80

45.173.88.33:80

185.33.0.233:80

188.2.217.94:80

207.144.103.227:80

45.161.242.102:80

219.92.13.25:80

190.163.31.26:80

68.183.170.114:8080

191.99.160.58:80

73.213.208.163:80

94.176.234.118:443

104.131.41.185:8080

45.33.77.42:8080

rsa_pubkey.plain

Targets

    • Target

      sample

    • Size

      76KB

    • MD5

      3e3114d537cdb5c3e23775860a549f2b

    • SHA1

      9b22e829693c0ef17eda0a15fd063dbcfc579b9b

    • SHA256

      7f55a835b27205d1537917788ff88e49c734a8a05bf0eab96225948ab75f479f

    • SHA512

      de3a2db6c7cbe3b27ec6afca0e0298b9fe2a2b286034d7ae110d54a362a6f99f7643fd270df1052929db7e47ce2470358490db48ab4f98dd39eec0b5e77209f0

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • suricata: ET MALWARE Win32/Emotet CnC Activity (POST) M8

      suricata: ET MALWARE Win32/Emotet CnC Activity (POST) M8

    • suricata: ET MALWARE Win32/Emotet CnC Activity (POST) M9

      suricata: ET MALWARE Win32/Emotet CnC Activity (POST) M9

    • Emotet Payload

      Detects Emotet payload in memory.

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks