General

  • Target

    PO.zip

  • Size

    665KB

  • Sample

    230314-qhsplafe27

  • MD5

    3ac03c3b8c9efb4b8ae79198a1626bd4

  • SHA1

    d9fb10fc0126e99d3c6d0ad48b11219fca6e5e21

  • SHA256

    949d794a8e3902bb7dc8c94046bbf4dbfc2fa1766325cd9a398263241cc35789

  • SHA512

    56f1f8b02e1c4fe3ce08fb9ab606c20c855eb1acad1a271c2223c37ed2c7124084d95600ef56a9b2efc6e2a039800a9d58e21d6887da929a43523bea91c775df

  • SSDEEP

    3072:2IFb4Wmkqke+cEeqH9vH+i2s1Vj8JxuLVpMs75XLKZvX:2Oykqk6Lw+i2s1Vjkxuxp/QvX

Malware Config

Extracted

Family

emotet

Botnet

Epoch4

C2

164.68.99.3:8080

164.90.222.65:443

186.194.240.217:443

1.234.2.232:8080

103.75.201.2:443

187.63.160.88:80

147.139.166.154:8080

91.207.28.33:8080

5.135.159.50:443

153.92.5.27:8080

213.239.212.5:443

103.43.75.120:443

159.65.88.10:8080

167.172.253.162:8080

153.126.146.25:7080

119.59.103.152:8080

107.170.39.149:8080

183.111.227.137:8080

159.89.202.34:443

110.232.117.186:8080

eck1.plain
ecs1.plain

Targets

    • Target

      PO.doc

    • Size

      510.3MB

    • MD5

      732336a4ffdffb6af529c92240c52aaa

    • SHA1

      0f132ee237e3c419422d33a7fdc8687d3a62068f

    • SHA256

      76e94f1bf0af4acd2e3dd307c9cb05ff1cce879a7c611e9e3dc01d8fd7a7f2cc

    • SHA512

      683ea54a98b83cbc857299e9511a165371d99a3f3e08f968faf4f3dba53c13de79d8676203f79a71f91cd68892157a1c37766951d4d81a57468e62be809d436a

    • SSDEEP

      6144:1620tqUx3Xu+7ZkRIDNGi9a0Va5UAClo:1620tqm3+I2ezcz5U3lo

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks