0d8f300056e0d5535f88fcf07e9ce3ccd894c78f25edd063ba1bb0e42c11b4e6

General
Target

0d8f300056e0d5535f88fcf07e9ce3ccd894c78f25edd063ba1bb0e42c11b4e6

Size

448KB

Sample

220521-xcbmfsefhp

Score
10 /10
MD5

850a888ebcfc98a87db2759afbbefd71

SHA1

e7ddfc86ce43989b2116e22148cb4384cd3274bd

SHA256

0d8f300056e0d5535f88fcf07e9ce3ccd894c78f25edd063ba1bb0e42c11b4e6

SHA512

123544bbd1fc4a070de3e7acbc9be51265665f6fa602a131dc36910482b37048f6825d78dd6013ab88e18564bd3d1feeb887465ac499356589c70f48171230ce

Malware Config

Extracted

Family emotet
Botnet Epoch3
C2

118.2.218.1:80

51.254.140.91:7080

5.9.227.244:8080

51.75.163.68:7080

75.127.14.170:8080

101.50.232.218:80

175.139.144.229:8080

139.59.12.63:8080

2.144.244.204:443

175.29.183.2:80

86.98.143.163:80

210.1.219.238:80

73.84.105.76:80

185.208.226.142:8080

91.75.75.46:80

188.251.213.180:443

88.249.181.198:443

77.74.78.80:443

181.137.229.1:80

190.136.179.102:80

24.26.151.3:80

46.105.131.68:8080

181.113.229.139:443

60.125.114.64:443

168.0.97.6:80

51.38.201.19:7080

103.80.51.61:8080

190.164.75.175:80

37.187.100.220:7080

190.96.15.50:80

190.190.15.20:80

45.182.161.17:80

179.5.118.12:80

198.57.203.63:8080

81.214.253.80:443

143.95.101.72:8080

91.83.93.103:443

157.245.138.101:7080

37.205.9.252:7080

172.105.78.244:8080

185.86.148.68:443

181.122.154.240:80

167.71.227.113:8080

66.61.94.36:80

201.213.177.139:80

189.39.32.161:80

186.227.146.102:80

192.241.220.183:8080

113.161.148.81:80

46.32.229.152:8080

rsa_pubkey.plain
Targets
Target

0d8f300056e0d5535f88fcf07e9ce3ccd894c78f25edd063ba1bb0e42c11b4e6

MD5

850a888ebcfc98a87db2759afbbefd71

Filesize

448KB

Score
10/10
SHA1

e7ddfc86ce43989b2116e22148cb4384cd3274bd

SHA256

0d8f300056e0d5535f88fcf07e9ce3ccd894c78f25edd063ba1bb0e42c11b4e6

SHA512

123544bbd1fc4a070de3e7acbc9be51265665f6fa602a131dc36910482b37048f6825d78dd6013ab88e18564bd3d1feeb887465ac499356589c70f48171230ce

Tags

Signatures

  • Emotet

    Description

    Emotet is a trojan that is primarily spread through spam emails.

    Tags

Related Tasks

MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
          Discovery
            Execution
              Exfiltration
                Impact
                  Initial Access
                    Lateral Movement
                      Persistence
                        Privilege Escalation
                          Tasks

                          static1

                          behavioral1

                          10/10

                          behavioral2

                          10/10