General

  • Target

    Ex.haierindia.zip

  • Size

    663KB

  • Sample

    230308-leqnlsfb44

  • MD5

    29d2a21921095f8d27a666f314eba9d0

  • SHA1

    a1a7bdcb50dceb5004a2a7b7668feb32e292bc7b

  • SHA256

    b4e1a91467ff7e3da67190e789574f92f012c66ed26e65e4c052a7fe7f16e70e

  • SHA512

    c0861875330316cdc2387f2b6d157abd0ca441c0a0cf1be94ba7973a4257c16469ccb542831e4144b5324a9b67961a1c2f0db136861043c99afcb9c0a7bbb394

  • SSDEEP

    6144:fXJNbwmfcuHom8Hz2f//ywiWT8xVTI5wqV2:zbPHom8TYyCT8x5I5wn

Malware Config

Extracted

Family

emotet

Botnet

Epoch4

C2

129.232.188.93:443

164.90.222.65:443

159.65.88.10:8080

172.105.226.75:8080

115.68.227.76:8080

187.63.160.88:80

169.57.156.166:8080

185.4.135.165:8080

153.126.146.25:7080

197.242.150.244:8080

139.59.126.41:443

186.194.240.217:443

103.132.242.26:8080

206.189.28.199:8080

163.44.196.120:8080

95.217.221.146:8080

159.89.202.34:443

119.59.103.152:8080

183.111.227.137:8080

201.94.166.162:443

eck1.plain
ecs1.plain

Targets

    • Target

      427927294761380652236__2023-08-03_1109.doc

    • Size

      513.3MB

    • MD5

      6564296ad94567c05c8c60c92d58f1b0

    • SHA1

      cbf8c111571d4edf4176591f1cc5849a5071bf35

    • SHA256

      820936c152fcb0930d83640c9879a04b8b1dc676b4b42d1f376bb92d475257a9

    • SHA512

      13946cbac1606449f1da79d946d0df55bb904b35bad78266800bc77b138fac6013f685e739106003dde451e9e8c92ad0544cefc4f623552d8fd42f689058b865

    • SSDEEP

      6144:xPn4VZXbatu7MDogsDkHS50LdfcGcbz1f5M9KTFrMpSlMK3Ru+Q28:xP4PbNMkgg3Ru+x

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v6

Tasks