General

  • Target

    UltraDropper.exe

  • Size

    57KB

  • Sample

    240531-h72pssba7t

  • MD5

    354274b178062ef85722f8204629e78d

  • SHA1

    616229aa8f5169938a9f5b872cc03a60209fa46b

  • SHA256

    d93cfa3cdbae1d62f1b55b7a0b60b547834cc144af1fc28b8afd69f9065f7f02

  • SHA512

    afb96510a0c38a9e4eb74040adc504dc3ff46b4845ea60b2271296e28f530e0d8cf7df3d6c2b5d47fc9c0334792c6621b8b48ec06cfe66701353d357d7a5a53f

  • SSDEEP

    768:/t+et7EWvq3fuXjUp2+1pMh4d/J/rflOeTqOW7xQ8VORH:ztGfuLc/J/blOtr7xQ8Vs

Malware Config

Extracted

Family

emotet

Botnet

Epoch5

C2

178.238.225.252:8080

139.196.72.155:8080

36.67.23.59:443

103.56.149.105:8080

37.44.244.177:8080

85.25.120.45:8080

202.134.4.210:7080

78.47.204.80:443

83.229.80.93:8080

93.104.209.107:8080

80.211.107.116:8080

165.22.254.236:8080

104.244.79.94:443

185.148.169.10:8080

190.145.8.4:443

175.126.176.79:8080

139.59.80.108:8080

188.165.79.151:443

128.199.217.206:443

64.227.55.231:8080

ecs1.plain
eck1.plain

Targets

    • Target

      UltraDropper.exe

    • Size

      57KB

    • MD5

      354274b178062ef85722f8204629e78d

    • SHA1

      616229aa8f5169938a9f5b872cc03a60209fa46b

    • SHA256

      d93cfa3cdbae1d62f1b55b7a0b60b547834cc144af1fc28b8afd69f9065f7f02

    • SHA512

      afb96510a0c38a9e4eb74040adc504dc3ff46b4845ea60b2271296e28f530e0d8cf7df3d6c2b5d47fc9c0334792c6621b8b48ec06cfe66701353d357d7a5a53f

    • SSDEEP

      768:/t+et7EWvq3fuXjUp2+1pMh4d/J/rflOeTqOW7xQ8VORH:ztGfuLc/J/blOtr7xQ8Vs

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks