General
-
Target
1.xls
-
Size
255KB
-
Sample
230125-m21yjahd7z
-
MD5
a1a832bedb8e1773a616cfe4ea57667d
-
SHA1
e6b7d0279681155adbaa6ae520ebdca55591d0a3
-
SHA256
655d910f284bd28364f826c9001492dc528846a392c10052c4ba1d1e4e436762
-
SHA512
2a68205052c9b8665ba9668493fcd54f4f4af27a97b1048e3776cf7cc7fedc70231cc23018effb49cd4d298a2be03c0c86bae18e3ce99f1f79cf8a1960a499c8
-
SSDEEP
6144:bKpb8rGYrMPe3q7Q0XV5xtuEsi8/dgzmnaVGraWWqXqzzyd17O6t0RmUoBQ:aXWWqazOd165RmvQ
Behavioral task
behavioral1
Sample
1.xls
Resource
win10-20220901-en
Malware Config
Extracted
Language | xlm4.0 |
Source |
|
URLs |
xlm40.dropper
https://datie-tw.com/img/SvH/
xlm40.dropper
http://central-nutrition.com/wp-content/Nh1L6YR4qlDFWS58cVB/
xlm40.dropper
http://championsfactorysampaios.com.br/xt5HKu/tDs8WsKOxQFq/
xlm40.dropper
https://dacsandongthapmuoi.vn/system/cron/HwOtNCFo/ |
Extracted
Family |
emotet |
Botnet |
Epoch5 |
C2 |
178.238.225.252:8080 139.196.72.155:8080 36.67.23.59:443 103.56.149.105:8080 37.44.244.177:8080 85.25.120.45:8080 202.134.4.210:7080 78.47.204.80:443 83.229.80.93:8080 93.104.209.107:8080 80.211.107.116:8080 165.22.254.236:8080 104.244.79.94:443 185.148.169.10:8080 190.145.8.4:443 175.126.176.79:8080 139.59.80.108:8080 188.165.79.151:443 128.199.217.206:443 64.227.55.231:8080 218.38.121.17:443 103.71.99.57:8080 103.224.241.74:8080 128.199.242.164:8080 85.214.67.203:8080 103.254.12.236:7080 46.101.98.60:8080 178.62.112.199:8080 210.57.209.142:8080 195.77.239.39:8080 103.126.216.86:443 82.98.180.154:7080 202.28.34.99:8080 174.138.33.49:7080 160.16.143.191:8080 51.75.33.122:443 103.41.204.169:8080 186.250.48.5:443 87.106.97.83:7080 118.98.72.86:443 196.44.98.190:8080 103.85.95.4:8080 62.171.178.147:8080 54.37.228.122:443 114.79.130.68:443 198.199.70.22:8080 |
ecs1.plain |
|
eck1.plain |
|
Targets
-
-
Target
1.xls
-
Size
255KB
-
MD5
a1a832bedb8e1773a616cfe4ea57667d
-
SHA1
e6b7d0279681155adbaa6ae520ebdca55591d0a3
-
SHA256
655d910f284bd28364f826c9001492dc528846a392c10052c4ba1d1e4e436762
-
SHA512
2a68205052c9b8665ba9668493fcd54f4f4af27a97b1048e3776cf7cc7fedc70231cc23018effb49cd4d298a2be03c0c86bae18e3ce99f1f79cf8a1960a499c8
-
SSDEEP
6144:bKpb8rGYrMPe3q7Q0XV5xtuEsi8/dgzmnaVGraWWqXqzzyd17O6t0RmUoBQ:aXWWqazOd165RmvQ
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Matrix
Collection
Command and Control
Credential Access
Defense Evasion
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation