General

  • Target

    b2e14256f9ff83b9836eff40ad9cca69_JaffaCakes118

  • Size

    224KB

  • Sample

    240616-lwfjzasfkq

  • MD5

    b2e14256f9ff83b9836eff40ad9cca69

  • SHA1

    6164d993313c991875cc904560822ffa0c4d7c56

  • SHA256

    5ae4f6476575cc3089004f874e1f13be4d6648e943f7db506890cac5abae01bb

  • SHA512

    841aab176ee6a386050c24221dc25ed21e3fea3a53e24c1ee0f101bc03c4bf34bf5d95e88a1cc9d0ddd223b71ee0e2b727cf5d4040f04fc2cb682f0ce3609989

  • SSDEEP

    3072:MD1v8rVN99d39aEeh35MGCHhP4KNRCohIg5i1HT7gfyC0aNpg9A:QChNfepFCHhPRHhIg5Cebfga

Malware Config

Extracted

Family

emotet

Botnet

Epoch1

C2

155.186.0.121:80

51.38.124.206:80

82.196.15.205:8080

38.88.126.202:8080

219.92.13.25:80

111.67.77.202:8080

95.9.180.128:80

77.90.136.129:8080

190.163.31.26:80

74.136.144.133:80

104.131.103.37:8080

45.33.77.42:8080

192.241.143.52:8080

78.249.119.122:80

177.74.228.34:80

152.169.22.67:80

92.24.50.153:80

5.189.178.202:8080

104.131.41.185:8080

82.230.1.24:80

rsa_pubkey.plain

Targets

    • Target

      b2e14256f9ff83b9836eff40ad9cca69_JaffaCakes118

    • Size

      224KB

    • MD5

      b2e14256f9ff83b9836eff40ad9cca69

    • SHA1

      6164d993313c991875cc904560822ffa0c4d7c56

    • SHA256

      5ae4f6476575cc3089004f874e1f13be4d6648e943f7db506890cac5abae01bb

    • SHA512

      841aab176ee6a386050c24221dc25ed21e3fea3a53e24c1ee0f101bc03c4bf34bf5d95e88a1cc9d0ddd223b71ee0e2b727cf5d4040f04fc2cb682f0ce3609989

    • SSDEEP

      3072:MD1v8rVN99d39aEeh35MGCHhP4KNRCohIg5i1HT7gfyC0aNpg9A:QChNfepFCHhPRHhIg5Cebfga

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Emotet payload

      Detects Emotet payload in memory.

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Tasks