General

  • Target

    e2d92407bdd52fa1c3b70bf743f55fbff63d6be5ada16315cc2ab3dcff0395b2.doc

  • Size

    233KB

  • Sample

    230321-3jqylsdg28

  • MD5

    9f5eb135eb4d47d4f0c80f090e0c4d26

  • SHA1

    5a6facad132f942b9783e6c817ab7a9ff535b5eb

  • SHA256

    e2d92407bdd52fa1c3b70bf743f55fbff63d6be5ada16315cc2ab3dcff0395b2

  • SHA512

    eb58cbb3cbd7b259bd1eb23a6a43e1afed05db4f42f8da18af65c4f62a80c95357e06878eba96079c11dffc48a881a78b26eeae051e8ba11961b6a8c3c3e1212

  • SSDEEP

    3072:OeGZrTwWS6ZL1CkdXDhjaPLW8Nl+U/XqP82gng0o1JiM0rK:gZvNL1BdXNONLq5FarK

Malware Config

Extracted

Family

emotet

Botnet

Epoch4

C2

213.239.212.5:443

129.232.188.93:443

103.43.75.120:443

197.242.150.244:8080

1.234.2.232:8080

110.232.117.186:8080

95.217.221.146:8080

159.89.202.34:443

159.65.88.10:8080

82.223.21.224:8080

169.57.156.166:8080

45.176.232.124:443

45.235.8.30:8080

173.212.193.249:8080

107.170.39.149:8080

119.59.103.152:8080

167.172.199.165:8080

91.207.28.33:8080

185.4.135.165:8080

104.168.155.143:8080

eck1.plain
ecs1.plain

Targets

    • Target

      e2d92407bdd52fa1c3b70bf743f55fbff63d6be5ada16315cc2ab3dcff0395b2.doc

    • Size

      233KB

    • MD5

      9f5eb135eb4d47d4f0c80f090e0c4d26

    • SHA1

      5a6facad132f942b9783e6c817ab7a9ff535b5eb

    • SHA256

      e2d92407bdd52fa1c3b70bf743f55fbff63d6be5ada16315cc2ab3dcff0395b2

    • SHA512

      eb58cbb3cbd7b259bd1eb23a6a43e1afed05db4f42f8da18af65c4f62a80c95357e06878eba96079c11dffc48a881a78b26eeae051e8ba11961b6a8c3c3e1212

    • SSDEEP

      3072:OeGZrTwWS6ZL1CkdXDhjaPLW8Nl+U/XqP82gng0o1JiM0rK:gZvNL1BdXNONLq5FarK

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v6

Tasks