General

  • Target

    bd7013435cce3b7f34312056f21d204e_JaffaCakes118

  • Size

    446KB

  • Sample

    240619-vp5d7azajq

  • MD5

    bd7013435cce3b7f34312056f21d204e

  • SHA1

    4c13322449496ca63a6ca1fadfb8411b50550451

  • SHA256

    5cc201207bdaab1b8a74e7ae1dd725f0b87c48b2e4bd361d92d49b5cbb51cbf9

  • SHA512

    d6e9914cfb16f7a9239ce1bab0402fa035c250eb91985bdd43756e56520f8aac4c9259a7dbc3c92a52a8312994b02fb3f31d9254b5b93ef0dc17bd58c85245f0

  • SSDEEP

    6144:cwekW4xuXsm2rJnMtQvq6H/iN2SO9rb8BhbbGC:cwvuXJ2rJnJv7HaNSFbCbb

Malware Config

Extracted

Family

emotet

Botnet

Epoch1

C2

91.105.94.200:80

51.38.124.206:80

38.88.126.202:8080

54.37.42.48:8080

189.2.177.210:443

181.30.61.163:443

185.178.10.77:80

199.203.62.165:80

177.73.0.98:443

87.106.46.107:8080

5.196.35.138:7080

5.189.178.202:8080

185.183.16.47:80

78.249.119.122:80

191.182.6.118:80

96.227.52.8:443

186.103.141.250:443

50.28.51.143:8080

111.67.12.221:8080

50.121.220.50:80

rsa_pubkey.plain

Targets

    • Target

      bd7013435cce3b7f34312056f21d204e_JaffaCakes118

    • Size

      446KB

    • MD5

      bd7013435cce3b7f34312056f21d204e

    • SHA1

      4c13322449496ca63a6ca1fadfb8411b50550451

    • SHA256

      5cc201207bdaab1b8a74e7ae1dd725f0b87c48b2e4bd361d92d49b5cbb51cbf9

    • SHA512

      d6e9914cfb16f7a9239ce1bab0402fa035c250eb91985bdd43756e56520f8aac4c9259a7dbc3c92a52a8312994b02fb3f31d9254b5b93ef0dc17bd58c85245f0

    • SSDEEP

      6144:cwekW4xuXsm2rJnMtQvq6H/iN2SO9rb8BhbbGC:cwvuXJ2rJnJv7HaNSFbCbb

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Emotet payload

      Detects Emotet payload in memory.

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Tasks