Overview
overview
10Static
static
893f0b81e-2...71.eml
windows7-x64
693f0b81e-2...71.eml
windows10-2004-x64
3Q255479503...32.zip
windows7-x64
1Q255479503...32.zip
windows10-2004-x64
1Q255479503...32.doc
windows7-x64
10Q255479503...32.doc
windows10-2004-x64
10email-html-1.html
windows7-x64
1email-html-1.html
windows10-2004-x64
1General
-
Target
93f0b81e-2fab-6767-7e64-3812cc9fe371.eml
-
Size
941KB
-
Sample
230310-g7327adf4x
-
MD5
50c9a15a4edc85b3ea32753374f49fee
-
SHA1
bc05011137beac6d0567ca6b2842bb77ea74baf7
-
SHA256
d643677b5e5d42199d6717218a8b62bf0319a3e21d176bc5e6757f6e202cef9c
-
SHA512
675a5f35fdf12b430041c34ce7b867cead4ade2913e5b977fade14961a492ca46506433d7bb1de33e945415061dc33884d093dfdbc228e174686b0ceddc58866
-
SSDEEP
6144:vfuxRRaFK6Wth/TWlEIV6KRxlENOe1TNp2:vfux16G9WlTV6KVAOe15p2
Behavioral task
behavioral1
Sample
93f0b81e-2fab-6767-7e64-3812cc9fe371.eml
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
93f0b81e-2fab-6767-7e64-3812cc9fe371.eml
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
Q25547950344368401064_202303091132.zip
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
Q25547950344368401064_202303091132.zip
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
Q25547950344368401064_202303091132.doc
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
Q25547950344368401064_202303091132.doc
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
email-html-1.html
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
email-html-1.html
Resource
win10v2004-20230221-en
Malware Config
Extracted
emotet
Epoch4
129.232.188.93:443
164.90.222.65:443
159.65.88.10:8080
172.105.226.75:8080
115.68.227.76:8080
187.63.160.88:80
169.57.156.166:8080
185.4.135.165:8080
153.126.146.25:7080
197.242.150.244:8080
139.59.126.41:443
186.194.240.217:443
103.132.242.26:8080
206.189.28.199:8080
163.44.196.120:8080
95.217.221.146:8080
159.89.202.34:443
119.59.103.152:8080
183.111.227.137:8080
201.94.166.162:443
103.75.201.2:443
149.56.131.28:8080
79.137.35.198:8080
5.135.159.50:443
66.228.32.31:7080
91.121.146.47:8080
153.92.5.27:8080
45.235.8.30:8080
72.15.201.15:8080
107.170.39.149:8080
45.176.232.124:443
82.223.21.224:8080
167.172.199.165:8080
213.239.212.5:443
202.129.205.3:8080
94.23.45.86:4143
147.139.166.154:8080
167.172.253.162:8080
91.207.28.33:8080
188.44.20.25:443
104.168.155.143:8080
110.232.117.186:8080
164.68.99.3:8080
1.234.2.232:8080
173.212.193.249:8080
182.162.143.56:443
160.16.142.56:8080
101.50.0.91:8080
103.43.75.120:443
Targets
-
-
Target
93f0b81e-2fab-6767-7e64-3812cc9fe371.eml
-
Size
941KB
-
MD5
50c9a15a4edc85b3ea32753374f49fee
-
SHA1
bc05011137beac6d0567ca6b2842bb77ea74baf7
-
SHA256
d643677b5e5d42199d6717218a8b62bf0319a3e21d176bc5e6757f6e202cef9c
-
SHA512
675a5f35fdf12b430041c34ce7b867cead4ade2913e5b977fade14961a492ca46506433d7bb1de33e945415061dc33884d093dfdbc228e174686b0ceddc58866
-
SSDEEP
6144:vfuxRRaFK6Wth/TWlEIV6KRxlENOe1TNp2:vfux16G9WlTV6KVAOe15p2
Score6/10-
Accesses Microsoft Outlook profiles
-
Drops file in System32 directory
-
-
-
Target
Q25547950344368401064_202303091132.zip
-
Size
675KB
-
MD5
06a43f9606a76b3fcd9a5c09c52cbc6f
-
SHA1
b57281a603545d4e67b474dd7a464bc596096e32
-
SHA256
dfbea1aef569f8c2fd2c8114065f6124a2b817c00b19d98bd63b019da379a68a
-
SHA512
2d4e037fc1b71568e12d4d56db75d88661e563f7742f578a5e269b9137ae1c8c6f2755f2cfc909fdc045261a64013d4d4a5b36cfe9b2087db36f4be2f8cf9e85
-
SSDEEP
3072:u9KxsZJTw9U8wkt3d9Oi0jKXnacTBy1uhzhh8Q8TiqfMA2+DVfZx2ePQCOJEg:u93zn23Oi0uXnTZj+Q8TbfMAJ1xPQjJB
Score1/10 -
-
-
Target
Q25547950344368401064_202303091132.doc
-
Size
539.2MB
-
MD5
6abc15b6b6e023239f2589101bb98db4
-
SHA1
dfdf26a0d3130fc83dd7b233bd080160df59c0b5
-
SHA256
6d07f92d1d5f9f60b3b6a69bc7dfe19c5bc3c9495b9b56852abb3bd347214a15
-
SHA512
5315ad12cf214d917c4ac9dbc46cbd5a3185936e9dd709dcfffd6843c97d433de80ed6dbf076c741e2e12cef958fc4c8e7945a8a9428dca1adcf57e452c66537
-
SSDEEP
3072:vpt3LDPYvrTr3jvZNWGBStinoLVMcXyHtt5YC7EGIuGEMYDDK6:H3AvrTPRUGpmpXqWCoGIuGEMY
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
-
-
Target
email-html-1.txt
-
Size
695B
-
MD5
f3d4c995cbfc85f8044baa8154679a2c
-
SHA1
7220e21d039f8529aec5c3cc7571701a17dfab4a
-
SHA256
c73bfe5095b7627107d4b8b0671a1fb60386d7f1ad0e75c803a0d5f5e9e78627
-
SHA512
ae258a6969d4fcdda8fcd4ab95f5e1aece9eb1eefe7ffff72162d1860a5fa569b66dfe4a4a13cc4c642ad1f40e245944d680eb08cb1edda5e626caff45a856a1
Score1/10 -