General

  • Target

    untitled_0911.xls

  • Size

    91KB

  • Sample

    221118-b68y6acc3z

  • MD5

    3b7c1af004581e0081622da0aa1e7bb1

  • SHA1

    200b021751f34af2f7d571b18d22127573caad2d

  • SHA256

    22b930d5b30553606c6dc4e340eff495ae3fdf7297e2b8bab9af3296f24b14c7

  • SHA512

    dab54cac66c6a95f19f1abe4c9f1d779007c95abd59d61a12a0a8147497bf752ad9b698a123d197c706eb18baa794b09adbf965912f3079ffacce9d16e3f6324

  • SSDEEP

    1536:LKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgObCXuZH4gb4CEn9J4Z70O:LKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgu

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://bevos-training.com/images/MtzUd/

xlm40.dropper

http://ec2-52-89-237-150.us-west-2.compute.amazonaws.com/bhr/wwqjkbu6mk/

xlm40.dropper

http://bwsengineering.co.za/configSHV/H0Rs/

xlm40.dropper

http://ctel.com.my/images/J5FV3DsngleQ3/

Extracted

Family

emotet

Botnet

Epoch5

C2

202.28.34.99:8080

80.211.107.116:8080

175.126.176.79:8080

218.38.121.17:443

139.196.72.155:8080

103.71.99.57:8080

87.106.97.83:7080

178.62.112.199:8080

64.227.55.231:8080

46.101.98.60:8080

54.37.228.122:443

128.199.217.206:443

190.145.8.4:443

209.239.112.82:8080

85.214.67.203:8080

198.199.70.22:8080

128.199.242.164:8080

178.238.225.252:8080

103.85.95.4:8080

103.126.216.86:443

eck1.plain
ecs1.plain

Targets

    • Target

      untitled_0911.xls

    • Size

      91KB

    • MD5

      3b7c1af004581e0081622da0aa1e7bb1

    • SHA1

      200b021751f34af2f7d571b18d22127573caad2d

    • SHA256

      22b930d5b30553606c6dc4e340eff495ae3fdf7297e2b8bab9af3296f24b14c7

    • SHA512

      dab54cac66c6a95f19f1abe4c9f1d779007c95abd59d61a12a0a8147497bf752ad9b698a123d197c706eb18baa794b09adbf965912f3079ffacce9d16e3f6324

    • SSDEEP

      1536:LKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgObCXuZH4gb4CEn9J4Z70O:LKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgu

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks