General

  • Target

    Rechnung 2023.15.03_.doc

  • Size

    402KB

  • Sample

    230315-v3p7esee34

  • MD5

    b937ee1ac8205718f56d8f1a4a1b6c3e

  • SHA1

    16736b8439b7b4afd986cb7ddaf2d178b71a5782

  • SHA256

    f4ca5de08a1a0a0974ceeffc8c2140b105d924ae2ac186f772cc30cd117a478e

  • SHA512

    0a0b5c26824514e7fcd3f3dd26a32b3ea481c2de3c48cbc7f3eab7476ee867bd9413d50e2665a6b5ebcfd91c1fd7c6f7487dddf6cdca47eda85e6b5430628461

  • SSDEEP

    6144:5yk1RgZZXbN63GW1Z7krKSUzMNYJJdKkOl950uH54Lg4Ne9C:5/MXJ6WW1Z7ktUgNYJJdKkOHC4D409

Malware Config

Extracted

Family

emotet

Botnet

Epoch5

C2

103.85.95.4:8080

103.224.241.74:8080

178.238.225.252:8080

37.59.103.148:8080

78.47.204.80:443

138.197.14.67:8080

128.199.242.164:8080

54.37.228.122:443

37.44.244.177:8080

139.59.80.108:8080

218.38.121.17:443

82.98.180.154:7080

114.79.130.68:443

159.65.135.222:7080

174.138.33.49:7080

195.77.239.39:8080

193.194.92.175:443

198.199.70.22:8080

85.214.67.203:8080

93.84.115.205:7080

ecs1.plain
eck1.plain

Targets

    • Target

      Rechnung 2023.15.03_.doc

    • Size

      402KB

    • MD5

      b937ee1ac8205718f56d8f1a4a1b6c3e

    • SHA1

      16736b8439b7b4afd986cb7ddaf2d178b71a5782

    • SHA256

      f4ca5de08a1a0a0974ceeffc8c2140b105d924ae2ac186f772cc30cd117a478e

    • SHA512

      0a0b5c26824514e7fcd3f3dd26a32b3ea481c2de3c48cbc7f3eab7476ee867bd9413d50e2665a6b5ebcfd91c1fd7c6f7487dddf6cdca47eda85e6b5430628461

    • SSDEEP

      6144:5yk1RgZZXbN63GW1Z7krKSUzMNYJJdKkOl950uH54Lg4Ne9C:5/MXJ6WW1Z7ktUgNYJJdKkOHC4D409

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

4
T1082

Query Registry

4
T1012

Peripheral Device Discovery

1
T1120

Tasks