General

  • Target

    442372b8f6c0a4f154b8a6e7741e8c98_JaffaCakes118

  • Size

    491KB

  • Sample

    240714-d6djcsvfjm

  • MD5

    442372b8f6c0a4f154b8a6e7741e8c98

  • SHA1

    81fe5ae0b5cc509fb65376270a7463174ae52ea6

  • SHA256

    b30b4c7d1185b17a004a4c6bbf5d537e0a3b2fe2c820d2a9555ba4e37613f3f0

  • SHA512

    2a03427291652b84d08bfd8377633bd1216cee70a5dc86b8df039a6b4c3f3a75e6f266658fc9b12fd9bed2cbff62041f41a2330b5931c99521b332b2a1ddf695

  • SSDEEP

    6144:iC2LiotuWe/fNcV1cwz4NN1O8v6KKImNfm:iC2LdtuWe9G1eNkK6jFu

Malware Config

Extracted

Family

emotet

Botnet

Epoch1

C2

45.4.32.50:80

170.81.48.2:80

167.71.148.58:443

211.215.18.93:8080

1.234.65.61:80

217.13.106.14:8080

12.163.208.58:80

178.250.54.208:8080

82.76.111.249:443

202.134.4.210:7080

172.245.248.239:8080

84.5.104.93:80

209.236.123.42:8080

192.175.111.212:7080

190.24.243.186:80

68.183.170.114:8080

187.39.237.56:8080

1.226.84.243:8080

191.182.6.118:80

152.169.22.67:80

rsa_pubkey.plain

Targets

    • Target

      442372b8f6c0a4f154b8a6e7741e8c98_JaffaCakes118

    • Size

      491KB

    • MD5

      442372b8f6c0a4f154b8a6e7741e8c98

    • SHA1

      81fe5ae0b5cc509fb65376270a7463174ae52ea6

    • SHA256

      b30b4c7d1185b17a004a4c6bbf5d537e0a3b2fe2c820d2a9555ba4e37613f3f0

    • SHA512

      2a03427291652b84d08bfd8377633bd1216cee70a5dc86b8df039a6b4c3f3a75e6f266658fc9b12fd9bed2cbff62041f41a2330b5931c99521b332b2a1ddf695

    • SSDEEP

      6144:iC2LiotuWe/fNcV1cwz4NN1O8v6KKImNfm:iC2LdtuWe9G1eNkK6jFu

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks