General

  • Target

    31d771857cac1c73f8e17c33410edef8_JaffaCakes118

  • Size

    330KB

  • Sample

    240709-y5zqestemq

  • MD5

    31d771857cac1c73f8e17c33410edef8

  • SHA1

    71667dacadb6ea0c1f2e97da5d2a5b96cdfc71f2

  • SHA256

    d1cd24dbfb3b111dfa9ec94273a1b628acdfb07eeff877b5572a5e815f3db1c3

  • SHA512

    57ca897bb22b41ffb16726a65e84b7458fbcd47a97f8d02957d701fceea6595639bcf724649017647f9cfd9d79f9d335e4c58a763ff6186e4fd5f2b65d7dd80b

  • SSDEEP

    3072:/Rq1sFAd2gQ5PmBvNZwnnq1gn2RvoXiDzAYgrO1v2F5j8eFu:Jq1sFAwgwmBv3wnIgG4oAYxvU54eu

Malware Config

Extracted

Family

emotet

Botnet

Epoch3

C2

190.55.186.229:80

203.157.152.9:7080

157.245.145.87:443

109.99.146.210:8080

116.202.10.123:8080

172.96.190.154:8080

163.53.204.180:443

190.107.118.125:80

91.93.3.85:8080

185.142.236.163:443

115.79.195.246:80

120.51.34.254:80

192.210.217.94:8080

198.20.228.9:8080

91.75.75.46:80

54.38.143.245:8080

161.49.84.2:80

162.144.145.58:8080

178.33.167.120:8080

201.193.160.196:80

rsa_pubkey.plain

Targets

    • Target

      31d771857cac1c73f8e17c33410edef8_JaffaCakes118

    • Size

      330KB

    • MD5

      31d771857cac1c73f8e17c33410edef8

    • SHA1

      71667dacadb6ea0c1f2e97da5d2a5b96cdfc71f2

    • SHA256

      d1cd24dbfb3b111dfa9ec94273a1b628acdfb07eeff877b5572a5e815f3db1c3

    • SHA512

      57ca897bb22b41ffb16726a65e84b7458fbcd47a97f8d02957d701fceea6595639bcf724649017647f9cfd9d79f9d335e4c58a763ff6186e4fd5f2b65d7dd80b

    • SSDEEP

      3072:/Rq1sFAd2gQ5PmBvNZwnnq1gn2RvoXiDzAYgrO1v2F5j8eFu:Jq1sFAwgwmBv3wnIgG4oAYxvU54eu

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks