General

  • Target

    558017ae9c3c65e65d03ded1a32e0c873c379be2bcf52c321b5cb4a12d04f18a.doc

  • Size

    381KB

  • Sample

    230321-3jvlssfg2z

  • MD5

    1640c9beb6c7afe550ba2e2d7584f179

  • SHA1

    74e2fcb40aa441192b94d57cb46d6aed9bd1b353

  • SHA256

    558017ae9c3c65e65d03ded1a32e0c873c379be2bcf52c321b5cb4a12d04f18a

  • SHA512

    9b0869ad92708cee4446781589589a48bb4d3cb433ed9695e79d5ce65e8b962e9cea51dbd2885a85892f6c0bdcf4dea2e3ebdaac14ede15d8659f1be029a5287

  • SSDEEP

    6144:E9fcsHgsTGbWqjWQ6e7t/5MIUAWuVfzmSsWnpoWgXEyV/FF:2fPPGBWQ6CBMIUreiSXgXtF

Malware Config

Extracted

Family

emotet

Botnet

Epoch4

C2

164.68.99.3:8080

164.90.222.65:443

186.194.240.217:443

1.234.2.232:8080

103.75.201.2:443

187.63.160.88:80

147.139.166.154:8080

91.207.28.33:8080

5.135.159.50:443

153.92.5.27:8080

213.239.212.5:443

103.43.75.120:443

159.65.88.10:8080

167.172.253.162:8080

153.126.146.25:7080

119.59.103.152:8080

107.170.39.149:8080

183.111.227.137:8080

159.89.202.34:443

110.232.117.186:8080

eck1.plain
ecs1.plain

Targets

    • Target

      558017ae9c3c65e65d03ded1a32e0c873c379be2bcf52c321b5cb4a12d04f18a.doc

    • Size

      381KB

    • MD5

      1640c9beb6c7afe550ba2e2d7584f179

    • SHA1

      74e2fcb40aa441192b94d57cb46d6aed9bd1b353

    • SHA256

      558017ae9c3c65e65d03ded1a32e0c873c379be2bcf52c321b5cb4a12d04f18a

    • SHA512

      9b0869ad92708cee4446781589589a48bb4d3cb433ed9695e79d5ce65e8b962e9cea51dbd2885a85892f6c0bdcf4dea2e3ebdaac14ede15d8659f1be029a5287

    • SSDEEP

      6144:E9fcsHgsTGbWqjWQ6e7t/5MIUAWuVfzmSsWnpoWgXEyV/FF:2fPPGBWQ6CBMIUreiSXgXtF

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

3
T1012

System Information Discovery

2
T1082

Tasks