General

  • Target

    4a027751d837878f215fed4aeede3feb3c85c9fecef120d9a30fc4f01e3983cf.zip

  • Size

    463KB

  • Sample

    230208-lxwmkshe6v

  • MD5

    072a32b6b4863fe3defb9905d195c81b

  • SHA1

    80716d3131ffc4893a014d1a749a2f4525c68e12

  • SHA256

    2e2eebb01a765d5e4ec9f8259fc916738b082dd103fdf977b0748b81234be98b

  • SHA512

    afe1c628b591353f49162e8c04e178be53dd7e7c1612e81f5045bebfba7815eb2fefc10523bb3ee9ad530b57fc7dca2c670d17b72a6c61810041d6df9a6df512

  • SSDEEP

    12288:y7XQvgkQsv3vW/wj5BgxpfLeL1oqfj/GBCKLMunRtn2M:aQbQsW/wKRJqfjuDMunHn

Malware Config

Extracted

Family

emotet

Botnet

Epoch5

C2

51.75.33.122:443

186.250.48.5:80

168.119.39.118:443

207.148.81.119:8080

194.9.172.107:8080

139.196.72.155:8080

78.47.204.80:443

159.69.237.188:443

45.71.195.104:8080

54.37.106.167:8080

185.168.130.138:443

37.44.244.177:8080

185.184.25.78:8080

185.148.168.15:8080

128.199.192.135:8080

37.59.209.141:8080

103.41.204.169:8080

185.148.168.220:8080

103.42.58.120:7080

78.46.73.125:443

eck1.plain
ecs1.plain

Targets

    • Target

      4a027751d837878f215fed4aeede3feb3c85c9fecef120d9a30fc4f01e3983cf.dll

    • Size

      801KB

    • MD5

      bc910112a2af9c89b4bd981a63956f0c

    • SHA1

      51305fddf426f4c67c37bdf1d457b5ac556ff3da

    • SHA256

      4a027751d837878f215fed4aeede3feb3c85c9fecef120d9a30fc4f01e3983cf

    • SHA512

      2984c74e565462a4c8f083fb03147a8a55ab776622c09f27877538ddfc3b6bbf97aa576ddc674e5346ba88995103eea4bc5844464b3b60ca1a0c7d5f6a6cf971

    • SSDEEP

      12288:JdTsX0HaZMrfZbHYIfRejZW8qEBMiMdnRYBGQhCoeH3L6EjXI:HQp66kxEXMdnGBGjXzjXI

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix

Tasks