Resubmissions

09-03-2023 06:42

230309-hgpybaah95 10

07-03-2023 13:00

230307-p826aaaa95 8

07-03-2023 12:24

230307-pljqeshc7z 10

General

  • Target

    INVOICE N L96505 03_23.zip

  • Size

    645KB

  • Sample

    230307-pljqeshc7z

  • MD5

    d7e47631ad707afed1eb1f1db03a89f6

  • SHA1

    67aa77cf0576662a8224a251c720b18ea6f63ebf

  • SHA256

    51f1fdf15170d27b6c36e52407bc57e614400179e93fb406eb8e8d6a1d3ecfa7

  • SHA512

    e6f45bb59d6814a0a5793d372b7937753f2fd722c625350c9a60af42b170ce645711fb25d7972598b29aea64d2053747f41c25cc0ea60437f9e0c756d2ed14f8

  • SSDEEP

    3072:C1lsI//z4a/hGS0NclN3U8XKp5ZuoWkQQhl0GEzal3Cj:C12c/z4a5GLNIp1WMkd3tCj

Malware Config

Extracted

Family

emotet

Botnet

Epoch4

C2

129.232.188.93:443

164.90.222.65:443

159.65.88.10:8080

172.105.226.75:8080

115.68.227.76:8080

187.63.160.88:80

169.57.156.166:8080

185.4.135.165:8080

153.126.146.25:7080

197.242.150.244:8080

139.59.126.41:443

186.194.240.217:443

103.132.242.26:8080

206.189.28.199:8080

163.44.196.120:8080

95.217.221.146:8080

159.89.202.34:443

119.59.103.152:8080

183.111.227.137:8080

201.94.166.162:443

eck1.plain
ecs1.plain

Targets

    • Target

      INVOICE 589 03_23.doc

    • Size

      526.2MB

    • MD5

      b59808aba76dd0095aa06133382de9ed

    • SHA1

      59aed06213b305d2877031e8ef489064ef74ca74

    • SHA256

      2e116e6a43dcc2ee55df34664a7d5bfae36918f3a8ce5af97be6cb99e3a4de5b

    • SHA512

      134c7c9929c277a3ec0403c2246214059d107c78c0056f8190218e0d16ded3cfaa7a4682d695f9e6212c66220cb222589c8fcd19f6ea70a00994eb06eec6566b

    • SSDEEP

      3072:eoEW2aOtFjH0lP2IpjctfRcVVwEi/A8NVM1wIOCbX6bYLjWFJuvx7ueK6:ZE1aOtFa2I9c3aVw4zwxCbJ4Jup

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks