General

  • Target

    034dec33fb61291515f2201b6412e776_JaffaCakes118

  • Size

    145KB

  • Sample

    240427-p8qggsbe7y

  • MD5

    034dec33fb61291515f2201b6412e776

  • SHA1

    e0fc81e65bf937a8761f0b53978139836bc5d44c

  • SHA256

    1c305ba670ec64f176fcb46743a796a8b5f1577dae118ef68740d410d8a14153

  • SHA512

    92e853c633ef23c625a11c03be43cc5dcd8f14438f2d6ca08511d87ac2e6c8c4bc507f467a468b34e2178d16deb80f6661a30080f255295533d4b1c8303b1e1b

  • SSDEEP

    3072:kyYIilXVCZV4xqbqP1AjTPsjuHY1sUycOo9EdAPioPZrnghGLOrigrcGN2:7zoMVuqePSHsMKOo9EdAPXPZLGGarmG

Malware Config

Extracted

Family

emotet

Botnet

Epoch1

C2

91.105.94.200:80

51.38.124.206:80

38.88.126.202:8080

54.37.42.48:8080

189.2.177.210:443

181.30.61.163:443

185.178.10.77:80

199.203.62.165:80

177.73.0.98:443

87.106.46.107:8080

5.196.35.138:7080

5.189.178.202:8080

185.183.16.47:80

78.249.119.122:80

191.182.6.118:80

96.227.52.8:443

186.103.141.250:443

50.28.51.143:8080

111.67.12.221:8080

50.121.220.50:80

rsa_pubkey.plain

Targets

    • Target

      034dec33fb61291515f2201b6412e776_JaffaCakes118

    • Size

      145KB

    • MD5

      034dec33fb61291515f2201b6412e776

    • SHA1

      e0fc81e65bf937a8761f0b53978139836bc5d44c

    • SHA256

      1c305ba670ec64f176fcb46743a796a8b5f1577dae118ef68740d410d8a14153

    • SHA512

      92e853c633ef23c625a11c03be43cc5dcd8f14438f2d6ca08511d87ac2e6c8c4bc507f467a468b34e2178d16deb80f6661a30080f255295533d4b1c8303b1e1b

    • SSDEEP

      3072:kyYIilXVCZV4xqbqP1AjTPsjuHY1sUycOo9EdAPioPZrnghGLOrigrcGN2:7zoMVuqePSHsMKOo9EdAPXPZLGGarmG

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Emotet payload

      Detects Emotet payload in memory.

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Tasks