General

  • Target

    Scan 17032023.zip

  • Size

    695KB

  • Sample

    230316-3nzfjsdd36

  • MD5

    45c8addac33ebfb2a06a84eb71bf65c2

  • SHA1

    6fd3d6b50238e503cf2b133b175b15fd513c2b4d

  • SHA256

    8bd95be84e4e64fbb343ef9c9f2e47899c9677a5d4c041c51ef753a110903283

  • SHA512

    26e711e94cba899cd672cecdae3c89e73afed399c1f509d108b80d3710f9d0e9639121c144c6334bf3552d9b5e6f0141adf2d57b4a05ffdddb5e272228edc51e

  • SSDEEP

    3072:CSgWiG5Z++yxJU4djtxx0SA0cEaEwj5hsXk6h4x3OOPi+RA5KYncoJMf:CSXvl4djtxx0ucEaHiXkllOU9o/Af

Malware Config

Extracted

Family

emotet

Botnet

Epoch5

C2

103.85.95.4:8080

103.224.241.74:8080

178.238.225.252:8080

37.59.103.148:8080

78.47.204.80:443

138.197.14.67:8080

128.199.242.164:8080

54.37.228.122:443

37.44.244.177:8080

139.59.80.108:8080

218.38.121.17:443

82.98.180.154:7080

114.79.130.68:443

159.65.135.222:7080

174.138.33.49:7080

195.77.239.39:8080

193.194.92.175:443

198.199.70.22:8080

85.214.67.203:8080

93.84.115.205:7080

ecs1.plain
eck1.plain

Targets

    • Target

      Scan 17032023.doc

    • Size

      523.3MB

    • MD5

      55fe5894b7671be6293fef02bf3dfd14

    • SHA1

      bd8a7873cd24606170c9e4fd89ed323bf2d8a03f

    • SHA256

      a38cbdcd30585d4c4f7040ad4bb6d322b97f284b4ad8fde199551610f89cb8ce

    • SHA512

      cfd615547b601cfb4d036c64eea07d81175b1f861d1943c236df83bed706db0f34a9db75826d5d914cdc69fe45776b4e3780e62c9fb9486d551f29d969fb12b7

    • SSDEEP

      6144:ip32/gDd0Nmt71wFmSWjfDrV8YQnZocbyrX4NqclWL9:ip32SEmtJwFmhjfPtrXqqyW

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Downloads MZ/PE file

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks