General

  • Target

    N.271 WAL 14.03.2023.zip

  • Size

    665KB

  • Sample

    230314-ml7fdaeh62

  • MD5

    e85c81c8deaa58ffdb945014c490f044

  • SHA1

    2f370a60efe85b7d58e3f2394c859284c1d50a9c

  • SHA256

    60ce0ae80a367110edfcaf0f25d0f93667752e11a233bdd28639a3cac90ebccb

  • SHA512

    beb710eada66193c1cd9fd1c0b82ee321badd5c1adb52d51bd7c6a22ccb3c63ce40dc3bf58ca55eb8450fd248272e40662afdf0223820acf6e965f2b4568ae8e

  • SSDEEP

    3072:0IFb4Wmkqke+cEeqH9vH+i2s1Vj8JxuLVpMs75XLKZv5:0Oykqk6Lw+i2s1Vjkxuxp/Qv5

Malware Config

Extracted

Family

emotet

Botnet

Epoch4

C2

164.68.99.3:8080

164.90.222.65:443

186.194.240.217:443

1.234.2.232:8080

103.75.201.2:443

187.63.160.88:80

147.139.166.154:8080

91.207.28.33:8080

5.135.159.50:443

153.92.5.27:8080

213.239.212.5:443

103.43.75.120:443

159.65.88.10:8080

167.172.253.162:8080

153.126.146.25:7080

119.59.103.152:8080

107.170.39.149:8080

183.111.227.137:8080

159.89.202.34:443

110.232.117.186:8080

eck1.plain
ecs1.plain

Targets

    • Target

      N.271 WAL 14.03.2023.doc

    • Size

      510.3MB

    • MD5

      732336a4ffdffb6af529c92240c52aaa

    • SHA1

      0f132ee237e3c419422d33a7fdc8687d3a62068f

    • SHA256

      76e94f1bf0af4acd2e3dd307c9cb05ff1cce879a7c611e9e3dc01d8fd7a7f2cc

    • SHA512

      683ea54a98b83cbc857299e9511a165371d99a3f3e08f968faf4f3dba53c13de79d8676203f79a71f91cd68892157a1c37766951d4d81a57468e62be809d436a

    • SSDEEP

      6144:1620tqUx3Xu+7ZkRIDNGi9a0Va5UAClo:1620tqm3+I2ezcz5U3lo

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks