Resubmissions

14-03-2023 10:13

230314-l9a7eagg8z 8

14-03-2023 10:11

230314-l75cgaeg64 10

General

  • Target

    Capcx Scan 2023.14.03_1101.zip

  • Size

    660KB

  • Sample

    230314-l75cgaeg64

  • MD5

    04fa0855d3d3501477209b1fa4d2d8cf

  • SHA1

    015b03b9e2098b2fc17a64c6f13adf2aae3af199

  • SHA256

    47af0d87b4b1abcfadb98d843add79393805040601ad4c7c27d22df4265bea49

  • SHA512

    ce8428816296cd37404dcbb0a193d871c14d44207fb35d0745264bee2e8e6c97c0c4ac54dd93cb7f1eb951147fa5db37c160a8525ceba2deeea53e1d951b5f1f

  • SSDEEP

    3072:9IFb4Wmkqke+cEeqH9vH+i2s1Vj8JxuLVpMs75XLKZvO:9Oykqk6Lw+i2s1Vjkxuxp/QvO

Malware Config

Extracted

Family

emotet

Botnet

Epoch4

C2

164.68.99.3:8080

164.90.222.65:443

186.194.240.217:443

1.234.2.232:8080

103.75.201.2:443

187.63.160.88:80

147.139.166.154:8080

91.207.28.33:8080

5.135.159.50:443

153.92.5.27:8080

213.239.212.5:443

103.43.75.120:443

159.65.88.10:8080

167.172.253.162:8080

153.126.146.25:7080

119.59.103.152:8080

107.170.39.149:8080

183.111.227.137:8080

159.89.202.34:443

110.232.117.186:8080

eck1.plain
ecs1.plain

Targets

    • Target

      Scan 2023.14.03_1101.doc

    • Size

      505.3MB

    • MD5

      b4c2209c6345ef88683247df6b90b3bc

    • SHA1

      4b17921aba075e4f2cf39cca0c355d4b51c4f45a

    • SHA256

      8276a5004242be36847f414af565eabd8726fa4746cc1cac9764f4e77ec6818e

    • SHA512

      2ee1b02c381e4d3e7b712daae1fb3c4ccd834ba7c702eddd985df9d5a76faa22663b4ca8afba241a7c81d4bed94cfaa09d18c4f824de6de91294ea1dd2bae11b

    • SSDEEP

      6144:1620tqUx3Xu+7ZkRIDNGi9a0Va5UAClo:1620tqm3+I2ezcz5U3lo

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v6

Tasks