General

  • Target

    d8cca538ecd91252ed5294bd8bbbb5772245e8b1315fd9723e1f08ee4ef6958d

  • Size

    116KB

  • Sample

    230323-ajelcscc45

  • MD5

    ad0358aa96105ca02607a7605f3a1e80

  • SHA1

    d64a68d180d675170062ce13014a479ebe1de5d8

  • SHA256

    d8cca538ecd91252ed5294bd8bbbb5772245e8b1315fd9723e1f08ee4ef6958d

  • SHA512

    5fe4924d1dd39cde2899e8937d8271c3f9394d4a149818d6e1e4fc83b35b30c810fe6b68dfcdd49a77d0cb9de1b996903213b92bbba64ecde8bc9341f55a5342

  • SSDEEP

    1536:Fb0e89MxTP6Pwp8R2ql1uFCijDfshsxEA5S6ZR5lLXG6OBrmEoBqkZYK8ApTz:FbJDDO7UckjjwQz

Malware Config

Extracted

Family

emotet

Botnet

Epoch4

C2

213.239.212.5:443

129.232.188.93:443

103.43.75.120:443

197.242.150.244:8080

1.234.2.232:8080

110.232.117.186:8080

95.217.221.146:8080

159.89.202.34:443

159.65.88.10:8080

82.223.21.224:8080

169.57.156.166:8080

45.176.232.124:443

45.235.8.30:8080

173.212.193.249:8080

107.170.39.149:8080

119.59.103.152:8080

167.172.199.165:8080

91.207.28.33:8080

185.4.135.165:8080

104.168.155.143:8080

eck1.plain
ecs1.plain

Targets

    • Target

      d8cca538ecd91252ed5294bd8bbbb5772245e8b1315fd9723e1f08ee4ef6958d

    • Size

      116KB

    • MD5

      ad0358aa96105ca02607a7605f3a1e80

    • SHA1

      d64a68d180d675170062ce13014a479ebe1de5d8

    • SHA256

      d8cca538ecd91252ed5294bd8bbbb5772245e8b1315fd9723e1f08ee4ef6958d

    • SHA512

      5fe4924d1dd39cde2899e8937d8271c3f9394d4a149818d6e1e4fc83b35b30c810fe6b68dfcdd49a77d0cb9de1b996903213b92bbba64ecde8bc9341f55a5342

    • SSDEEP

      1536:Fb0e89MxTP6Pwp8R2ql1uFCijDfshsxEA5S6ZR5lLXG6OBrmEoBqkZYK8ApTz:FbJDDO7UckjjwQz

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Blocklisted process makes network request

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Query Registry

1
T1012

Tasks