General

  • Target

    b226b24e1dad45c745a47d988b5c491d_JaffaCakes118

  • Size

    216KB

  • Sample

    240616-hb14dsxbrr

  • MD5

    b226b24e1dad45c745a47d988b5c491d

  • SHA1

    700d0f07679462970d94c74737a268d17bc5ae34

  • SHA256

    f2cabb3ac0c090ba8122f068202886734895f22eb1c3d469f16b8d83ae6147a0

  • SHA512

    f17a2874dc1ec6e4e5759ddee4b904bc6fad6a4cc766798bea79fb5ed335c2b11d47ec2390f66fa0091a04586b5de59b3acfddf9bf687f4a0dc840f6eee78f36

  • SSDEEP

    6144:426zQqGAvo3z+c4ccld5b2IOIQlNtGZknCko7Xs2sZI:4JGAgjH8w2sC

Malware Config

Extracted

Family

emotet

Botnet

Epoch1

C2

181.30.61.163:443

209.126.6.222:8080

5.153.250.14:8080

188.135.15.49:80

104.131.41.185:8080

178.250.54.208:8080

50.28.51.143:8080

170.81.48.2:80

87.106.46.107:8080

191.99.160.58:80

187.162.248.237:80

89.32.150.160:8080

46.28.111.142:7080

190.190.148.27:8080

190.115.18.139:8080

178.79.163.131:8080

73.213.208.163:80

219.92.8.17:8080

95.9.180.128:80

212.71.237.140:8080

rsa_pubkey.plain

Targets

    • Target

      b226b24e1dad45c745a47d988b5c491d_JaffaCakes118

    • Size

      216KB

    • MD5

      b226b24e1dad45c745a47d988b5c491d

    • SHA1

      700d0f07679462970d94c74737a268d17bc5ae34

    • SHA256

      f2cabb3ac0c090ba8122f068202886734895f22eb1c3d469f16b8d83ae6147a0

    • SHA512

      f17a2874dc1ec6e4e5759ddee4b904bc6fad6a4cc766798bea79fb5ed335c2b11d47ec2390f66fa0091a04586b5de59b3acfddf9bf687f4a0dc840f6eee78f36

    • SSDEEP

      6144:426zQqGAvo3z+c4ccld5b2IOIQlNtGZknCko7Xs2sZI:4JGAgjH8w2sC

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Emotet payload

      Detects Emotet payload in memory.

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Tasks