General

  • Target

    b5d5c32dc571ac92e1fd4505d9fa4c49_JaffaCakes118

  • Size

    292KB

  • Sample

    240616-3v96mayclk

  • MD5

    b5d5c32dc571ac92e1fd4505d9fa4c49

  • SHA1

    d5bd9a869b9e29ed9772a3e1fe3f23169fa4ca09

  • SHA256

    3bddd428f41c5e84c24bece40b38abc83333d66532311170da0f5ea06171e943

  • SHA512

    326a2b4afb76db948b8bf77e2a8c68aec42b92ed6e8e69ccb57f85e2ea5f11e2375e97f85cd74c1bb9cafa01a7fd3640dae456025ae1be4eeb35768ef98e4f04

  • SSDEEP

    3072:TyDDt+sqWE654G+COT7xNyH0kd0Vzw/BlC5Igu86XBfL3BEcB4K5QvvQ2Uzai:wt+bYHnOT9hY0VEAIgu8m52Mx5QvM

Malware Config

Extracted

Family

emotet

Botnet

Epoch3

C2

190.192.39.136:80

5.189.168.53:8080

162.241.41.111:7080

190.85.46.52:7080

190.190.15.20:80

181.95.133.104:80

41.212.89.128:80

115.176.16.221:80

143.95.101.72:8080

75.127.14.170:8080

116.202.10.123:8080

74.208.173.91:8080

103.93.220.182:80

50.116.78.109:8080

67.121.104.51:20

180.26.62.115:443

139.59.12.63:8080

76.18.16.210:80

113.161.148.81:80

5.79.70.250:8080

rsa_pubkey.plain

Targets

    • Target

      b5d5c32dc571ac92e1fd4505d9fa4c49_JaffaCakes118

    • Size

      292KB

    • MD5

      b5d5c32dc571ac92e1fd4505d9fa4c49

    • SHA1

      d5bd9a869b9e29ed9772a3e1fe3f23169fa4ca09

    • SHA256

      3bddd428f41c5e84c24bece40b38abc83333d66532311170da0f5ea06171e943

    • SHA512

      326a2b4afb76db948b8bf77e2a8c68aec42b92ed6e8e69ccb57f85e2ea5f11e2375e97f85cd74c1bb9cafa01a7fd3640dae456025ae1be4eeb35768ef98e4f04

    • SSDEEP

      3072:TyDDt+sqWE654G+COT7xNyH0kd0Vzw/BlC5Igu86XBfL3BEcB4K5QvvQ2Uzai:wt+bYHnOT9hY0VEAIgu8m52Mx5QvM

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Emotet payload

      Detects Emotet payload in memory.

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Tasks