General

  • Target

    Rech.zip

  • Size

    697KB

  • Sample

    230310-ky692acd96

  • MD5

    2cc96c1351a8019f25c700f04badc8f9

  • SHA1

    6f264d240d0bf48a7484f9c949f9be7b74cf32f3

  • SHA256

    2b4d68f3afc4141e7a7e07539183a5e9d9b9f415583adaf89d72ad197e605744

  • SHA512

    df923297cd47132fedfd578a95eaba8bc426c62e0922bb52bea6b5afc9c655957c339b79e57096cc867f5c8d4581bf46866b6a454f203645c6bd711122f8eb82

  • SSDEEP

    3072:zTdhlKitY6gngARvVndTW9ZCPuJSDCKvjl1flV+crxAm40/yL/sEZGNKl/Q:lhQOY6egwndgkPwSDCKFVj+mb/yFIs/Q

Malware Config

Extracted

Family

emotet

Botnet

Epoch4

C2

164.68.99.3:8080

164.90.222.65:443

186.194.240.217:443

1.234.2.232:8080

103.75.201.2:443

187.63.160.88:80

147.139.166.154:8080

91.207.28.33:8080

5.135.159.50:443

153.92.5.27:8080

213.239.212.5:443

103.43.75.120:443

159.65.88.10:8080

167.172.253.162:8080

153.126.146.25:7080

119.59.103.152:8080

107.170.39.149:8080

183.111.227.137:8080

159.89.202.34:443

110.232.117.186:8080

eck1.plain
ecs1.plain

Targets

    • Target

      Rech.doc

    • Size

      538.3MB

    • MD5

      2e482ad30930c0761ccd7b580bd2d64c

    • SHA1

      ba4375f6a6c283469c32590584585e7e57fe2ea3

    • SHA256

      79a0df39ea0faf9e4c80a2cde2401e16e26e033e855578bc5e2ef501c190581f

    • SHA512

      84eb2dba8a21417f747bb2a5a1253c2004bcb4594284cd12557194b81f5c1591a9732aed75b587ffbe890e7d3b32ea688ee227531cb269c8c5db8d637f5cb032

    • SSDEEP

      6144:jkmCUX1RauEA55axdWFyDDIqqmbwbLUW:omC7uz552AFZqXbwbA

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v6

Tasks