General

  • Target

    DOCUMENT 8.zip

  • Size

    715KB

  • Sample

    230316-wdtc8aed6z

  • MD5

    e760068e224e34a22152415726c9aac7

  • SHA1

    dfe5ba10c8844bffdf372423fcbaea2a46eac6e6

  • SHA256

    701bc79b024d6741a5fad6bb0ad6106eb73331e9f59dde5de6d85f98657edb5f

  • SHA512

    1f4e5655920edceaef748cffd20286f566f5b91b7f62779c8e0df4a7fee9fa78978d0bb09df28e405c3bc62247a8e97849bbb73f7752ce8a0461d6f535aaf9b7

  • SSDEEP

    6144:aQpjt+nAXz13VqEXUDJc/5Rur4GlzRH2V:Jlt+nAFIm5RolzRHC

Malware Config

Extracted

Family

emotet

Botnet

Epoch5

C2

103.85.95.4:8080

103.224.241.74:8080

178.238.225.252:8080

37.59.103.148:8080

78.47.204.80:443

138.197.14.67:8080

128.199.242.164:8080

54.37.228.122:443

37.44.244.177:8080

139.59.80.108:8080

218.38.121.17:443

82.98.180.154:7080

114.79.130.68:443

159.65.135.222:7080

174.138.33.49:7080

195.77.239.39:8080

193.194.92.175:443

198.199.70.22:8080

85.214.67.203:8080

93.84.115.205:7080

ecs1.plain
eck1.plain

Targets

    • Target

      DOCUMENT 8.doc

    • Size

      505.4MB

    • MD5

      25d19b15d963fc2749f7b84c63936a8f

    • SHA1

      4bdae276c0475d01be1eb5946ac5cc8bce5d92d3

    • SHA256

      3000e062ceff0ab1b081015ee1d95b284cb226d58995baf66c5048559591e195

    • SHA512

      24a6683d6300bc1eecba8a7861666b104c52df4002db0594df70bc7abb8ebe6c8baa9de1bf99eccc7a8f7d8cc3a2951bec7ddd88add2bc95dd28bd3f9815f5bd

    • SSDEEP

      6144:NeWM86RZzwTFQR9jD77fyO0XwBh12DD2JfCFFyinWLqcRJ:EWnE8FQvTfx0XwBz4D0aFjM

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Downloads MZ/PE file

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks