General

  • Target

    0c2ce873d171108c19bab950ce233a65_JaffaCakes118

  • Size

    176KB

  • Sample

    240501-s27zqscd87

  • MD5

    0c2ce873d171108c19bab950ce233a65

  • SHA1

    4a0bfb4bab57b9dd7694ae6510a4cfdb3ccfc62e

  • SHA256

    cae84b8d48d0cd2c47f192dbdaa63a998f8b55f714e3ceb86d9b841ab3e1251e

  • SHA512

    9ad8c69230dd347601f74c307a27b5168e725a99cf0266022db309631c11577d5a937f1b0967d063fbf990a44d222a7725ab413e82076f05e4e9b1a0ed423d87

  • SSDEEP

    1536:8RucTgvK09KKbheJJowUQLweYYpEuEX/PokElw7wyBTgT/Ac:8vgCOheJJowPkeYoEuEPLJwYTgAc

Malware Config

Extracted

Family

emotet

Botnet

Epoch1

C2

65.36.62.20:80

209.126.6.222:8080

5.153.250.14:8080

204.225.249.100:7080

77.90.136.129:8080

185.94.252.27:443

85.105.140.135:443

83.169.21.32:7080

190.190.148.27:8080

185.94.252.12:80

116.125.120.88:443

190.115.18.139:8080

61.92.159.208:8080

24.148.98.177:80

212.93.117.170:80

91.219.169.180:80

73.116.193.136:80

87.106.46.107:8080

187.162.248.237:80

70.32.115.157:8080

rsa_pubkey.plain

Targets

    • Target

      0c2ce873d171108c19bab950ce233a65_JaffaCakes118

    • Size

      176KB

    • MD5

      0c2ce873d171108c19bab950ce233a65

    • SHA1

      4a0bfb4bab57b9dd7694ae6510a4cfdb3ccfc62e

    • SHA256

      cae84b8d48d0cd2c47f192dbdaa63a998f8b55f714e3ceb86d9b841ab3e1251e

    • SHA512

      9ad8c69230dd347601f74c307a27b5168e725a99cf0266022db309631c11577d5a937f1b0967d063fbf990a44d222a7725ab413e82076f05e4e9b1a0ed423d87

    • SSDEEP

      1536:8RucTgvK09KKbheJJowUQLweYYpEuEX/PokElw7wyBTgT/Ac:8vgCOheJJowPkeYoEuEPLJwYTgAc

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Emotet payload

      Detects Emotet payload in memory.

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks