General

  • Target

    1564-59-0x00000000002D0000-0x00000000002E0000-memory.dmp

  • Size

    64KB

  • Sample

    220831-emgx4sgfbn

  • MD5

    e5fb38b21856d8603b926794fbd973b7

  • SHA1

    b92e028c939a8eeff60cabd15fea80a66cca4eb4

  • SHA256

    4ad33bce76060302bb11b2b3d8910632dc9b5530211d38fdca318c01830b1e6b

  • SHA512

    a8ece67facb887fabdaf5bd77e7b1b3cfc1d6c27aab4ae7bafa9280a3115ab5933036a5124306a90c092d95472403b34fc98bf420b1a947e7151da5319633689

  • SSDEEP

    768:xSexy1r+ELqtGqCl9UIvQYp5AXMxZMLXgIV+O6LH/rO5lEi9qqDpK:bxyAlvCWI4Yp+XCMLwS+OmH2nqqDpK

Malware Config

Extracted

Family

emotet

Botnet

Epoch2

C2

82.225.49.121:80

120.138.30.150:8080

139.59.67.118:443

94.23.216.33:80

203.117.253.142:80

139.99.158.11:443

87.106.139.101:8080

190.160.53.126:80

5.39.91.110:7080

107.5.122.110:80

174.102.48.180:443

194.187.133.160:443

153.177.101.120:443

104.236.246.93:8080

78.24.219.147:8080

94.23.237.171:443

85.66.181.138:80

157.245.99.39:8080

201.173.217.124:443

91.211.88.52:7080

rsa_pubkey.plain

Targets

    • Target

      1564-59-0x00000000002D0000-0x00000000002E0000-memory.dmp

    • Size

      64KB

    • MD5

      e5fb38b21856d8603b926794fbd973b7

    • SHA1

      b92e028c939a8eeff60cabd15fea80a66cca4eb4

    • SHA256

      4ad33bce76060302bb11b2b3d8910632dc9b5530211d38fdca318c01830b1e6b

    • SHA512

      a8ece67facb887fabdaf5bd77e7b1b3cfc1d6c27aab4ae7bafa9280a3115ab5933036a5124306a90c092d95472403b34fc98bf420b1a947e7151da5319633689

    • SSDEEP

      768:xSexy1r+ELqtGqCl9UIvQYp5AXMxZMLXgIV+O6LH/rO5lEi9qqDpK:bxyAlvCWI4Yp+XCMLwS+OmH2nqqDpK

    Score
    1/10

MITRE ATT&CK Matrix

Tasks