General

  • Target

    2096-0-0x00000000001A0000-0x00000000001C2000-memory.dmp

  • Size

    136KB

  • MD5

    e317dcdabe290399e2e04f213d730dc5

  • SHA1

    a242092602a51608e3ffc6bd5639aacd370b95a9

  • SHA256

    5e82492982cd87b9b6f8f5460c30c4f0ded2f1916fbf5186b9efabf6255487d1

  • SHA512

    0b47d74e67be3dac0617e09cb06606c29d96b28cf06b314a98dc508ad67a5769b02a46d1251e4f58479a466f230d512580b6e32c6ddb12f1633d3e4ee2bf5bfa

  • SSDEEP

    1536:LuYVPzq3xTRayI/PT3y8+jgrbcxklpaN/P9vX004eqll5poxFI+K7aMPtlVI3uzH:LtVPuO5z3y8+8EZziv8xWN6+zUb5BD

Score
10/10

Malware Config

Extracted

Family

emotet

Botnet

Epoch3

C2

125.0.215.60:80

163.53.204.180:443

89.163.210.141:8080

203.157.152.9:7080

157.245.145.87:443

82.78.179.117:443

85.247.144.202:80

37.46.129.215:8080

110.37.224.243:80

192.210.217.94:8080

2.82.75.215:80

69.159.11.38:443

188.166.220.180:7080

103.93.220.182:80

198.20.228.9:8080

91.75.75.46:80

88.247.30.64:80

189.211.214.19:443

203.160.167.243:80

178.33.167.120:8080

rsa_pubkey.plain

Signatures

  • Emotet family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2096-0-0x00000000001A0000-0x00000000001C2000-memory.dmp
    .dll windows:6 windows x86


    Headers

    Sections