General
Target

be5298975baf1a5c449049c8ba9340b3606ee300673c68c811a7d79c9d9db4bb.xls

Size

95KB

Sample

220707-evz4nafbb2

Score
10/10
MD5

e5e6ad7617dfe6ed5ceb85db2f7018ab

SHA1

c8726692870c91a1e9e3eef50fea2620ac90fd1a

SHA256

be5298975baf1a5c449049c8ba9340b3606ee300673c68c811a7d79c9d9db4bb

SHA512

4c967b6968e4650b6747cd78eb76f21d724652af134d8232223ee961e71147957c8345433a9b9bb5bd9d08456a8c776d931d096bbbb0c4cb9da748fb879bb28f

Malware Config

Extracted

Language xlm4.0
Source
URLs
xlm40.dropper

https://edoraseguros.com.br/cgi-bin/jQNq9wlH1GXU/

xlm40.dropper

http://earthmach.co.za/libraries/tWkZh9YrXbTd6IeX/

xlm40.dropper

http://finvest.rs/wp-admin/Hr9nVNTIHgw59S/

xlm40.dropper

http://efverstedt.se/5jjaV/w7fLEHJ20xn0qD/

Extracted

Family

emotet

Botnet

Epoch5

C2

103.71.99.57:8080

103.224.241.74:8080

157.245.111.0:8080

37.44.244.177:8080

103.41.204.169:8080

64.227.55.231:8080

103.254.12.236:7080

103.85.95.4:8080

157.230.99.206:8080

165.22.254.236:8080

85.214.67.203:8080

54.37.228.122:443

195.77.239.39:8080

128.199.217.206:443

190.145.8.4:443

165.232.185.110:8080

188.165.79.151:443

178.62.112.199:8080

54.37.106.167:8080

104.244.79.94:443

43.129.209.178:443

87.106.97.83:7080

202.134.4.210:7080

178.238.225.252:8080

198.199.70.22:8080

62.171.178.147:8080

175.126.176.79:8080

128.199.242.164:8080

88.217.172.165:8080

104.248.225.227:8080

85.25.120.45:8080

139.196.72.155:8080

188.225.32.231:4143

202.29.239.162:443

103.126.216.86:443

210.57.209.142:8080

93.104.209.107:8080

196.44.98.190:8080

5.253.30.17:7080

46.101.98.60:8080

103.56.149.105:8080

190.107.19.179:443

139.59.80.108:8080

36.67.23.59:443

78.47.204.80:443

83.229.80.93:8080

174.138.33.49:7080

118.98.72.86:443

37.187.114.15:8080

202.28.34.99:8080

eck1.plain
ecs1.plain
Targets
Target

be5298975baf1a5c449049c8ba9340b3606ee300673c68c811a7d79c9d9db4bb.xls

MD5

e5e6ad7617dfe6ed5ceb85db2f7018ab

Filesize

95KB

Score
10/10
SHA1

c8726692870c91a1e9e3eef50fea2620ac90fd1a

SHA256

be5298975baf1a5c449049c8ba9340b3606ee300673c68c811a7d79c9d9db4bb

SHA512

4c967b6968e4650b6747cd78eb76f21d724652af134d8232223ee961e71147957c8345433a9b9bb5bd9d08456a8c776d931d096bbbb0c4cb9da748fb879bb28f

Tags

Signatures

  • Emotet

    Description

    Emotet is a trojan that is primarily spread through spam emails.

    Tags

  • Process spawned unexpected child process

    Description

    This typically indicates the parent process was compromised via an exploit or macro.

  • suricata: ET MALWARE W32/Emotet CnC Beacon 3

    Description

    suricata: ET MALWARE W32/Emotet CnC Beacon 3

    Tags

  • Downloads MZ/PE file

  • Loads dropped DLL

Related Tasks

MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
          Exfiltration
            Impact
              Initial Access
                Lateral Movement
                  Persistence
                    Privilege Escalation
                      Tasks

                      static1

                      Score
                      8/10

                      behavioral1

                      Score
                      10/10

                      behavioral2

                      Score
                      10/10