General

  • Target

    467517e279495a140732b500bb3c4577_JaffaCakes118

  • Size

    160KB

  • Sample

    240515-q192lacc62

  • MD5

    467517e279495a140732b500bb3c4577

  • SHA1

    83752d3915c82587a11064cf4874138862630bed

  • SHA256

    679df33267153abcd2731e04465f3141d6d8630323209b38371a5e9c69b6ac72

  • SHA512

    1e09d24ba0dcf3d11c3388da5e9061f94e005370fc39aa6f9f5c2b2316e54f69b617da15b031ff9f8dc8ea39e9bac3d1d45f4872222b073464dbbd4a59fd8148

  • SSDEEP

    3072:IRMxtgIrpwUMun+SlId2ccld5b2IOIQlNtGZknCBNZHAr9BnZfp/adi:TxtUGMd2ccld5b2IOIQlNtGZknC/NAbU

Malware Config

Extracted

Family

emotet

Botnet

Epoch2

C2

137.119.36.33:80

116.202.234.183:8080

69.30.203.214:8080

204.197.146.48:80

87.106.136.232:8080

153.163.83.106:80

91.211.88.52:7080

93.147.212.206:80

222.214.218.37:4143

189.212.199.126:443

203.153.216.189:7080

83.169.36.251:8080

188.83.220.2:443

104.236.246.93:8080

173.62.217.22:443

5.196.74.210:8080

68.188.112.97:80

139.130.242.43:80

61.19.246.238:443

24.179.13.119:80

rsa_pubkey.plain

Targets

    • Target

      467517e279495a140732b500bb3c4577_JaffaCakes118

    • Size

      160KB

    • MD5

      467517e279495a140732b500bb3c4577

    • SHA1

      83752d3915c82587a11064cf4874138862630bed

    • SHA256

      679df33267153abcd2731e04465f3141d6d8630323209b38371a5e9c69b6ac72

    • SHA512

      1e09d24ba0dcf3d11c3388da5e9061f94e005370fc39aa6f9f5c2b2316e54f69b617da15b031ff9f8dc8ea39e9bac3d1d45f4872222b073464dbbd4a59fd8148

    • SSDEEP

      3072:IRMxtgIrpwUMun+SlId2ccld5b2IOIQlNtGZknCBNZHAr9BnZfp/adi:TxtUGMd2ccld5b2IOIQlNtGZknC/NAbU

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Emotet payload

      Detects Emotet payload in memory.

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks