General

  • Target

    2096-0-0x0000000000480000-0x00000000004A2000-memory.dmp

  • Size

    136KB

  • Sample

    231018-kxsp9aeb92

  • MD5

    eac511d102109de27cc9210e2b521e34

  • SHA1

    da9c20448524521f8c14610736631f1a10fee56e

  • SHA256

    5bacfd5c60a1ca6b4cbc52e227cc66ed8499b82cc769e34407ac87eb3bc5f1ac

  • SHA512

    67507d722d35f8e375c2d4b2d9e39057aa5062feffc9ae21170f6a096814d0536095928a5e87af28118eaa6aa26dc281663de570956481520c74e20185fbf6b6

  • SSDEEP

    1536:1uY3Pzq35TR4CGbPTDy80pgn5qZW3Jsz/P9zd004egllXVix/IIiRaMPtlVI3uvF:1t3PuUrPDy80GElR4v0x+j6+vcT5vD

Score
10/10

Malware Config

Extracted

Family

emotet

Botnet

Epoch3

C2

125.0.215.60:80

163.53.204.180:443

89.163.210.141:8080

203.157.152.9:7080

157.245.145.87:443

82.78.179.117:443

85.247.144.202:80

37.46.129.215:8080

110.37.224.243:80

192.210.217.94:8080

2.82.75.215:80

69.159.11.38:443

188.166.220.180:7080

103.93.220.182:80

198.20.228.9:8080

91.75.75.46:80

88.247.30.64:80

189.211.214.19:443

203.160.167.243:80

178.33.167.120:8080

rsa_pubkey.plain

Targets

    • Target

      2096-0-0x0000000000480000-0x00000000004A2000-memory.dmp

    • Size

      136KB

    • MD5

      eac511d102109de27cc9210e2b521e34

    • SHA1

      da9c20448524521f8c14610736631f1a10fee56e

    • SHA256

      5bacfd5c60a1ca6b4cbc52e227cc66ed8499b82cc769e34407ac87eb3bc5f1ac

    • SHA512

      67507d722d35f8e375c2d4b2d9e39057aa5062feffc9ae21170f6a096814d0536095928a5e87af28118eaa6aa26dc281663de570956481520c74e20185fbf6b6

    • SSDEEP

      1536:1uY3Pzq35TR4CGbPTDy80pgn5qZW3Jsz/P9zd004egllXVix/IIiRaMPtlVI3uvF:1t3PuUrPDy80GElR4v0x+j6+vcT5vD

    Score
    1/10

MITRE ATT&CK Matrix

Tasks