Resubmissions

09-03-2023 23:18

230309-3ase3scd7z 8

09-03-2023 20:03

230309-ys1rysbf8x 10

General

  • Target

    payment.zip

  • Size

    707KB

  • Sample

    230309-ys1rysbf8x

  • MD5

    e607f8754ebe696ff5037517dd6f7ee7

  • SHA1

    bbde3f3c1f57077801e336d57d70b9b0ac9d9d96

  • SHA256

    746aec8fa2532926c62ead1f37431538f14c12da17c8fe5f3467ea2f529a7ea8

  • SHA512

    504055b62a8da862eb418e8d380e56966da9572882869439523611accd5c65148953516cee13d7b2b7db1e5e230188ed5dc57c9a5645c368edc1e8d11475848c

  • SSDEEP

    3072:bjkdNNlBl3tTPyn/fIvTr+/LTSTHoXuS3Xw8uAnuA3rogT9/N:vkd/l3DvTKTsHkdtuAswN

Malware Config

Extracted

Family

emotet

Botnet

Epoch4

C2

129.232.188.93:443

164.90.222.65:443

159.65.88.10:8080

172.105.226.75:8080

115.68.227.76:8080

187.63.160.88:80

169.57.156.166:8080

185.4.135.165:8080

153.126.146.25:7080

197.242.150.244:8080

139.59.126.41:443

186.194.240.217:443

103.132.242.26:8080

206.189.28.199:8080

163.44.196.120:8080

95.217.221.146:8080

159.89.202.34:443

119.59.103.152:8080

183.111.227.137:8080

201.94.166.162:443

eck1.plain
ecs1.plain

Targets

    • Target

      payment.doc

    • Size

      535.3MB

    • MD5

      7b7d867d75208d0b29fd085dc361b3a5

    • SHA1

      de46e975ee50e60fad1c242e947cc2888fdd1ca2

    • SHA256

      c5cb7f97846bc2e1505e89df5483889b519d6d004f34da44a0703a232b33902f

    • SHA512

      6c513b6f8351cc74032bf6c4f7f4377a65e24f1c6b25b0c4ed27d7c649c240752cf3c267ca99a81d2063c771366bd29394fdf37c38c6257d27abf137380e5485

    • SSDEEP

      3072:PdObXXXW20dj1sZQ5hVYyQmBKe4ltVBjSBkzmlykp7WTDIrV2Dl9QjdDK6:YXW2M5V5oe4lBjSOz8zp7YDIr0BE

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v6

Tasks