General

  • Target

    A 2618033.zip

  • Size

    717KB

  • Sample

    230322-kmklwsfg89

  • MD5

    581709f6d99126b05d3cfd3e88a07438

  • SHA1

    5cf5cff07e700adcec8fb7a0696a7db524a40a30

  • SHA256

    1858af1beb761e5763bd2af55e4e3ccc3c48064061ab36805f405ed8162a3dc8

  • SHA512

    da515d78458f629ed6e52dd0ac8af3c876b1d7eff053113f032f1781b31f24f5e42b7c28b785e1511844826c3793bcc5b5fdc197cbb68939db5a008a1ef69804

  • SSDEEP

    3072:eSgWiG5Z++yxJU4djtxx0SA0cEaEwj5hsXk6h4x3OOPi+RA5KYncoJMb:eSXvl4djtxx0ucEaHiXkllOU9o/Ab

Malware Config

Extracted

Family

emotet

Botnet

Epoch5

C2

103.85.95.4:8080

103.224.241.74:8080

178.238.225.252:8080

37.59.103.148:8080

78.47.204.80:443

138.197.14.67:8080

128.199.242.164:8080

54.37.228.122:443

37.44.244.177:8080

139.59.80.108:8080

218.38.121.17:443

82.98.180.154:7080

114.79.130.68:443

159.65.135.222:7080

174.138.33.49:7080

195.77.239.39:8080

193.194.92.175:443

198.199.70.22:8080

85.214.67.203:8080

93.84.115.205:7080

ecs1.plain
eck1.plain

Targets

    • Target

      A 2618033.doc

    • Size

      546.3MB

    • MD5

      426605dcab3d0984594354b775aa9906

    • SHA1

      6d6fd88c1ada6675141aa1f41e17db7f2a0bbd3f

    • SHA256

      76bf34f1085973786f6e62ebb0d1aa900519dfe9cd64ee82ebda62ca35bc7080

    • SHA512

      314dd9444d08fcda2fb6d08ef6ce17e98f545ce312470446090101ed17d813bb19ea2e007804235ba708d0b0518a4d8c2b31e9e2b4c816effa9612896f73deb4

    • SSDEEP

      6144:ip32/gDd0Nmt71wFmSWjfDrV8YQnZocbyrX4NqclWL9:ip32SEmtJwFmhjfPtrXqqyW

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks