General

  • Target

    b12fa1c872b673c7d85c60f969a43eb8_JaffaCakes118

  • Size

    224KB

  • Sample

    240616-b9gn3svbma

  • MD5

    b12fa1c872b673c7d85c60f969a43eb8

  • SHA1

    4fd18fc00139791b9b91bc557548e6d2f1d5d4ff

  • SHA256

    efd23bb07bd91cbbecea4b3a3e2932a6a5750b09a7651f4c4c5e8bfe1aebc615

  • SHA512

    fcad490e51dfb66d1991b208831c671d908a8ec3d78b8539ed5a89ede92150c0878499594f8c83dd3169236fb8f47aed182880c03895af3f80564348636e4a2d

  • SSDEEP

    3072:MD1v8rVN99d39aEeh35MGC1hP4KNRCohIg5i1HT7gfyC0aNpg9A:QChNfepFC1hPRHhIg5Cebfga

Malware Config

Extracted

Family

emotet

Botnet

Epoch1

C2

155.186.0.121:80

51.38.124.206:80

82.196.15.205:8080

38.88.126.202:8080

219.92.13.25:80

111.67.77.202:8080

95.9.180.128:80

77.90.136.129:8080

190.163.31.26:80

74.136.144.133:80

104.131.103.37:8080

45.33.77.42:8080

192.241.143.52:8080

78.249.119.122:80

177.74.228.34:80

152.169.22.67:80

92.24.50.153:80

5.189.178.202:8080

104.131.41.185:8080

82.230.1.24:80

rsa_pubkey.plain

Targets

    • Target

      b12fa1c872b673c7d85c60f969a43eb8_JaffaCakes118

    • Size

      224KB

    • MD5

      b12fa1c872b673c7d85c60f969a43eb8

    • SHA1

      4fd18fc00139791b9b91bc557548e6d2f1d5d4ff

    • SHA256

      efd23bb07bd91cbbecea4b3a3e2932a6a5750b09a7651f4c4c5e8bfe1aebc615

    • SHA512

      fcad490e51dfb66d1991b208831c671d908a8ec3d78b8539ed5a89ede92150c0878499594f8c83dd3169236fb8f47aed182880c03895af3f80564348636e4a2d

    • SSDEEP

      3072:MD1v8rVN99d39aEeh35MGC1hP4KNRCohIg5i1HT7gfyC0aNpg9A:QChNfepFC1hPRHhIg5Cebfga

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Emotet payload

      Detects Emotet payload in memory.

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Tasks