General

  • Target

    2024-02-21_36694ee6200c5801104d6aad8d4d8f82_icedid

  • Size

    292KB

  • Sample

    240221-w4xhkadf63

  • MD5

    36694ee6200c5801104d6aad8d4d8f82

  • SHA1

    2735c49b3f5860e43e36205b11c0bf6807214c22

  • SHA256

    9467e958fac0af32e2251c27873888c914100960e9a63864a7ce27a034881a35

  • SHA512

    10d712150e369b62357fc2622ab35dbb7775a38c664747677f2ed91a74d48aea87263cddc0e0b3e6fe1d2de460c58330502bf4f178bebd8bfd7d9479bcd18c38

  • SSDEEP

    3072:TWjt+sU2E6BIG+CKj7xNuX0EpQVz1XBlC5AISu4IJQtnrce1X8jkX2Uzai:St+t4/nKj9F8QVR4AISu4eQtnoeujE

Malware Config

Extracted

Family

emotet

Botnet

Epoch1

C2

91.105.94.200:80

51.38.124.206:80

38.88.126.202:8080

54.37.42.48:8080

189.2.177.210:443

181.30.61.163:443

185.178.10.77:80

199.203.62.165:80

177.73.0.98:443

87.106.46.107:8080

5.196.35.138:7080

5.189.178.202:8080

185.183.16.47:80

78.249.119.122:80

191.182.6.118:80

96.227.52.8:443

186.103.141.250:443

50.28.51.143:8080

111.67.12.221:8080

50.121.220.50:80

rsa_pubkey.plain

Targets

    • Target

      2024-02-21_36694ee6200c5801104d6aad8d4d8f82_icedid

    • Size

      292KB

    • MD5

      36694ee6200c5801104d6aad8d4d8f82

    • SHA1

      2735c49b3f5860e43e36205b11c0bf6807214c22

    • SHA256

      9467e958fac0af32e2251c27873888c914100960e9a63864a7ce27a034881a35

    • SHA512

      10d712150e369b62357fc2622ab35dbb7775a38c664747677f2ed91a74d48aea87263cddc0e0b3e6fe1d2de460c58330502bf4f178bebd8bfd7d9479bcd18c38

    • SSDEEP

      3072:TWjt+sU2E6BIG+CKj7xNuX0EpQVz1XBlC5AISu4IJQtnrce1X8jkX2Uzai:St+t4/nKj9F8QVR4AISu4eQtnoeujE

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Emotet payload

      Detects Emotet payload in memory.

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Tasks