General

  • Target

    1720-58-0x0000000000340000-0x000000000035B000-memory.dmp

  • Size

    108KB

  • MD5

    84c234de4f3e6aecc470f753da3c16d2

  • SHA1

    ea448cf543ffecfc857b28235a0792c0c8948776

  • SHA256

    58ddfa5863de17de4f73f38d2a39605edbcb8d068e88795af00ad7e98d5d1372

  • SHA512

    dd56e5cbd619109bd6f80badfb1db84e00fcca7a713525561c398a9d686f57e0f7dacda9fcacd96eea95a583518fe427ce88f7f65d1ace6394c5c20dc44109ab

  • SSDEEP

    1536:fjc31MMILtPSQ7eTfJ15YDzi8udd0BQGFtY+/D/C9qBPDWqvbf2q8t:foarLtIK2Gch9qRWqvF

Malware Config

Extracted

Family

emotet

Botnet

Epoch3

C2

221.147.142.214:80

188.40.170.197:80

51.38.50.144:8080

46.22.116.163:7080

190.151.5.131:443

58.27.215.3:8080

179.5.118.12:80

73.100.19.104:80

192.210.217.94:8080

192.163.221.191:8080

103.93.220.182:80

91.213.106.100:8080

190.192.39.136:80

115.79.59.157:80

190.164.135.81:80

91.83.93.103:443

188.166.220.180:7080

116.202.10.123:8080

36.91.44.183:80

77.74.78.80:443

rsa_pubkey.plain

Signatures

  • Emotet family
  • Emotet payload 1 IoCs

    Detects Emotet payload in memory.

Files

  • 1720-58-0x0000000000340000-0x000000000035B000-memory.dmp
    .exe windows x86


    Headers

    Sections