General

  • Target

    1812-10-0x0000000000300000-0x000000000030C000-memory.dmp

  • Size

    48KB

  • MD5

    3a5cb4c7504d98489e4e22036742597a

  • SHA1

    ae5e977424d7a1457960026d588f5d8ff87b9412

  • SHA256

    dcfa75736cb72a2c4e157e1ecc5a648c8c47648e8df6c58552946fd53208a0ff

  • SHA512

    6d5e8270bbe819f96009351c6a47f2b940c2bf701c31c7e660c8fb402aad2c2db0fd1ecb0cf397c2ec0a9b43dd941e469a69f11c1d986c06e70b8728828cd10e

  • SSDEEP

    768:22+2NBaoMo7PCm6y4opz0Uh4psQfEtvDpAp+YkC20fOPEIpk4YVPzCh:22+2NrrncUhQsQSpAR2Xtpl0zC

Malware Config

Extracted

Family

emotet

Botnet

Epoch3

C2

201.235.10.215:80

198.57.203.63:8080

163.172.107.70:8080

172.105.78.244:8080

107.161.30.122:8080

203.153.216.182:7080

37.46.129.215:8080

201.214.108.231:80

178.33.167.120:8080

181.113.229.139:443

192.210.217.94:8080

24.157.25.203:80

94.96.60.191:80

157.7.164.178:8081

75.127.14.170:8080

189.146.1.78:443

190.164.75.175:80

192.241.220.183:8080

190.55.233.156:80

91.83.93.103:443

rsa_pubkey.plain

Signatures

  • Emotet family
  • Emotet payload 1 IoCs

    Detects Emotet payload in memory.

Files

  • 1812-10-0x0000000000300000-0x000000000030C000-memory.dmp