Resubmissions

17-06-2024 09:27

240617-le3yyaycqj 10

General

  • Target

    b7e3d73e4fd408d57f3745996766df04_JaffaCakes118

  • Size

    667KB

  • Sample

    240617-le3yyaycqj

  • MD5

    b7e3d73e4fd408d57f3745996766df04

  • SHA1

    a08eb84086a69a1a8dba4348b08e8ee1922d50b1

  • SHA256

    9dbca757bae4e95f06c3e0ba3539e6ddc3328154fd2e0b66ffadbb6d7ca38e50

  • SHA512

    2e3b4a00af74c1b44a9728e3c53edb84270180eb1dfd59ec56ad7fb539298751acb6841b4a8f8b1a5ed72f4526bb63ebe57ecb77ee008d23d2d2007e5e503189

  • SSDEEP

    12288:U2JhG//t8C5VCFSoDpaQlHfl6mCiWDaBMFCGoCGsq:U2JC/t8iVNoDgQVN6mCipt3X

Malware Config

Extracted

Family

emotet

Botnet

Epoch3

C2

116.91.240.96:80

167.71.227.113:8080

190.85.46.52:7080

162.144.42.60:8080

202.166.170.43:80

95.216.205.155:8080

120.51.34.254:80

103.93.220.182:80

111.89.241.139:80

60.125.114.64:443

45.177.120.37:8080

185.86.148.68:443

75.127.14.170:8080

119.92.77.17:80

203.153.216.178:7080

172.96.190.154:8080

179.5.118.12:80

153.229.219.1:443

139.59.12.63:8080

115.79.195.246:80

rsa_pubkey.plain

Targets

    • Target

      b7e3d73e4fd408d57f3745996766df04_JaffaCakes118

    • Size

      667KB

    • MD5

      b7e3d73e4fd408d57f3745996766df04

    • SHA1

      a08eb84086a69a1a8dba4348b08e8ee1922d50b1

    • SHA256

      9dbca757bae4e95f06c3e0ba3539e6ddc3328154fd2e0b66ffadbb6d7ca38e50

    • SHA512

      2e3b4a00af74c1b44a9728e3c53edb84270180eb1dfd59ec56ad7fb539298751acb6841b4a8f8b1a5ed72f4526bb63ebe57ecb77ee008d23d2d2007e5e503189

    • SSDEEP

      12288:U2JhG//t8C5VCFSoDpaQlHfl6mCiWDaBMFCGoCGsq:U2JC/t8iVNoDgQVN6mCipt3X

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Emotet payload

      Detects Emotet payload in memory.

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Tasks