General

  • Target

    Invoice Number 979646.zip.zip

  • Size

    151KB

  • Sample

    230314-msapzseh94

  • MD5

    5b4fed3bc9c1a1a2ad5343f1f6db5f03

  • SHA1

    fbad99035288bf1c3baf704fff9b2c0765295c94

  • SHA256

    96912bdc44215d8d228e66c2d16809643a70e0f9ff64b13d1881b5befee7c0ca

  • SHA512

    5408c04e6bf1d5525cc5474eb8f05c054cad516f445a3f6a24ef9a3cc40f780171b899c25c33a0eaf8628024d633bccc7780b39213e673e431d8c64abc8eabb3

  • SSDEEP

    3072:2ieOh/sxyjcv6mpi1k/HWLaMaRu/9WNL6ZYOTfx:/eOhkE4vRWuWOM7/sNGZp5

Malware Config

Extracted

Family

emotet

Botnet

Epoch4

C2

164.68.99.3:8080

164.90.222.65:443

186.194.240.217:443

1.234.2.232:8080

103.75.201.2:443

187.63.160.88:80

147.139.166.154:8080

91.207.28.33:8080

5.135.159.50:443

153.92.5.27:8080

213.239.212.5:443

103.43.75.120:443

159.65.88.10:8080

167.172.253.162:8080

153.126.146.25:7080

119.59.103.152:8080

107.170.39.149:8080

183.111.227.137:8080

159.89.202.34:443

110.232.117.186:8080

eck1.plain
ecs1.plain

Targets

    • Target

      Invoice Number 979646.doc

    • Size

      535.3MB

    • MD5

      2855f6b1a3801c210b75146462a1d704

    • SHA1

      224516c91e780e7917521182ddc5b14afad7de6d

    • SHA256

      5be08e46bbe7dc937ad38deb70d95fa9d64595191baf16afb84f45a58ea494c1

    • SHA512

      442209ea678952e34699e91dd6ae50c445cd201caa7ec085e73a5c3ebc2cd0516ee89bcc600fd4e5653e4824c2c4604dae02f57bc21c46bc7e1d33f197b82695

    • SSDEEP

      6144:1620tqUx3Xu+7ZkRIDNGi9a0Va5UAClo:1620tqm3+I2ezcz5U3lo

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks