General

  • Target

    9eae6f49a02d6eb9f75af7bbf4349808.bin

  • Size

    16KB

  • Sample

    230325-b7cbksae53

  • MD5

    b137f28ca30eb24a2d90e153f2892760

  • SHA1

    2eff2552a75e413b270b8238405efa39cd6f769a

  • SHA256

    10577ba2211f0fbeef74f324c7cf68ad5713cf6f2b23059c98b7003e62afd77e

  • SHA512

    8ccf4a14f88296b9cf0f7025d4fc15b0df55b580570e509504399a62ecfc8ccc1a6430d73fe8700ff291ed8c6a58c91b364693636aa15eee77930fc45609cfab

  • SSDEEP

    384:hGg2EAzKnHKkXiFqJrFH4SwT30bMw9MMSShy:hGglEKHKkXwqJXMw9aSM

Malware Config

Extracted

Family

emotet

Botnet

Epoch4

C2

213.239.212.5:443

129.232.188.93:443

103.43.75.120:443

197.242.150.244:8080

1.234.2.232:8080

110.232.117.186:8080

95.217.221.146:8080

159.89.202.34:443

159.65.88.10:8080

82.223.21.224:8080

169.57.156.166:8080

45.176.232.124:443

45.235.8.30:8080

173.212.193.249:8080

107.170.39.149:8080

119.59.103.152:8080

167.172.199.165:8080

91.207.28.33:8080

185.4.135.165:8080

104.168.155.143:8080

eck1.plain
ecs1.plain

Targets

    • Target

      31fb4bf411dcd7fcb860bdb1db26859290b047b39b94638a7d4fd2a46d323e98.vbs

    • Size

      88KB

    • MD5

      9eae6f49a02d6eb9f75af7bbf4349808

    • SHA1

      2caf7ddeb9fc1d6076558661ef69b9638cfd2e7b

    • SHA256

      31fb4bf411dcd7fcb860bdb1db26859290b047b39b94638a7d4fd2a46d323e98

    • SHA512

      37b45c58efd8c2bee66c30bca4a3777d5b6ba39e97d34baa8e7bc27fb083397d818a2708cbcf7d4704398fdfff4cbc17abff68b33294292413527702c1ad7eef

    • SSDEEP

      768:vvQxmTUdOGFf77IlCpfj2d7gtD/uqDX4l8EE1:vvQxxOGV77Fj2sDRX4lG1

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks