General

  • Target

    untitled 550.xls

  • Size

    217KB

  • Sample

    221104-hh4g4aefen

  • MD5

    2cbd1cdca247f0f28fc63a5c0e0b13d5

  • SHA1

    966e13dfaa1080606d3f47e8cb6c3abd5568b847

  • SHA256

    64ff2f53597a590af0608eb012ffd3320f647949019b806da2cbf6fed1eae264

  • SHA512

    5f5379a66fa9aacb0563c25ed18dd56e605836b4a4813dc8694df1097183878d2d072ef6530832c0319b7f611ab2c96e68265b52d9e29996fcc6ab3ea62ebad6

  • SSDEEP

    6144:OKpb8rGYrMPe3q7Q0XV5xtuEsi8/dgJyY+TAQXTHGUMEyP5p6f5jQm1:4bGUMVWlb1

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://ruitaiwz.com/wp-admin/sV1NeVxLDiHJ1xm/

xlm40.dropper

http://wordpress.xinmoshiwang.com/list/cRIH9Bd/

xlm40.dropper

http://cultura.educad.pe/wp-content/A86I7QxwuEZV/

xlm40.dropper

http://voinet.ca/cgi-bin/RXDWHpi8dHHZf8/

Extracted

Family

emotet

Botnet

Epoch5

C2

178.238.225.252:8080

139.196.72.155:8080

36.67.23.59:443

103.56.149.105:8080

37.44.244.177:8080

85.25.120.45:8080

202.134.4.210:7080

78.47.204.80:443

83.229.80.93:8080

93.104.209.107:8080

80.211.107.116:8080

165.22.254.236:8080

104.244.79.94:443

185.148.169.10:8080

190.145.8.4:443

175.126.176.79:8080

139.59.80.108:8080

188.165.79.151:443

128.199.217.206:443

64.227.55.231:8080

ecs1.plain
eck1.plain

Targets

    • Target

      untitled 550.xls

    • Size

      217KB

    • MD5

      2cbd1cdca247f0f28fc63a5c0e0b13d5

    • SHA1

      966e13dfaa1080606d3f47e8cb6c3abd5568b847

    • SHA256

      64ff2f53597a590af0608eb012ffd3320f647949019b806da2cbf6fed1eae264

    • SHA512

      5f5379a66fa9aacb0563c25ed18dd56e605836b4a4813dc8694df1097183878d2d072ef6530832c0319b7f611ab2c96e68265b52d9e29996fcc6ab3ea62ebad6

    • SSDEEP

      6144:OKpb8rGYrMPe3q7Q0XV5xtuEsi8/dgJyY+TAQXTHGUMEyP5p6f5jQm1:4bGUMVWlb1

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Downloads MZ/PE file

    • Loads dropped DLL

MITRE ATT&CK Enterprise v6

Tasks