General

  • Target

    Fattura 329864.zip

  • Size

    702KB

  • Sample

    230314-nenv5afa88

  • MD5

    b7c5fcd627c69c80bdd96818c3948ca0

  • SHA1

    29e285484ce4e2065aa1d0336880172b1aa0311e

  • SHA256

    4e5ccc03a527b9a344d5e2c452943d003f9cc77a645d33c6e1a54ab826b5d2eb

  • SHA512

    4efc5560a0095710311fc8b72576427945a6faf4391c1dcca428400da8afd9c3d37dfef50cf5ffe619b7612a9ad20c69c3ac7c2a86ac3448a342dbbf74c0a09d

  • SSDEEP

    3072:zIFb4Wmkqke+cEeqH9vH+i2s1Vj8JxuLVpMs75XLKZvF:zOykqk6Lw+i2s1Vjkxuxp/QvF

Malware Config

Extracted

Family

emotet

Botnet

Epoch4

C2

164.68.99.3:8080

164.90.222.65:443

186.194.240.217:443

1.234.2.232:8080

103.75.201.2:443

187.63.160.88:80

147.139.166.154:8080

91.207.28.33:8080

5.135.159.50:443

153.92.5.27:8080

213.239.212.5:443

103.43.75.120:443

159.65.88.10:8080

167.172.253.162:8080

153.126.146.25:7080

119.59.103.152:8080

107.170.39.149:8080

183.111.227.137:8080

159.89.202.34:443

110.232.117.186:8080

eck1.plain
ecs1.plain

Targets

    • Target

      Fattura 329864.doc

    • Size

      548.3MB

    • MD5

      8ad41b75ac260ad12600a77dbf27de25

    • SHA1

      fcf2484ae2913cefe5de026ef39b2537bda10138

    • SHA256

      33a483e9a68e674ba8166300aa38d19197b1ee5bb72ff784a9e48797c5337c9b

    • SHA512

      e9f481765d140bf3a0c716a1f138d75b0b3b12333f84dc9820efa01a2557b4e93797545497937fc82f1e752fc93c3967ddf7639503046fd2d532eecb0783709c

    • SSDEEP

      6144:1620tqUx3Xu+7ZkRIDNGi9a0Va5UAClo:1620tqm3+I2ezcz5U3lo

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v6

Tasks