General

  • Target

    2024-07-25_49de0cbd75e714e647749f752ed46c78_icedid_wapomi

  • Size

    212KB

  • Sample

    240725-lmqctatfpc

  • MD5

    49de0cbd75e714e647749f752ed46c78

  • SHA1

    5d845b029a550d73364071c8d6ddccbfcc3cbf5c

  • SHA256

    6f6bac4133e06b5a0bb3a8dad3874f7c33b51319396896c60d2bdf9e9f77def9

  • SHA512

    e1f992bb075b28bc6ebe57ce3efc438c78bc3c84adf27d5271e6109e15ceefccb46452314ccab6abd4ce8ec8e9d811b8b62b9fa8ae1c9d0c847eac72c46d1dfc

  • SSDEEP

    3072:NRZLLKF311qOaUlc7XBGbuQickfJ4/sWjk3lGz5JuRQ6FSpuAHkruD+GCH:PC13aU2LYCVD4//D5J6FSp30K

Malware Config

Extracted

Family

emotet

Botnet

Epoch2

C2

195.76.232.114:80

82.223.70.24:8080

45.33.49.124:443

136.243.205.112:7080

110.145.77.103:80

74.208.45.104:8080

24.94.237.248:80

186.208.123.210:443

67.235.68.222:80

209.151.248.242:8080

200.41.121.90:80

5.196.74.210:8080

201.173.217.124:443

185.155.20.82:80

139.130.242.43:80

114.145.241.208:80

168.235.67.138:7080

162.241.92.219:8080

98.156.206.153:80

101.187.97.173:80

rsa_pubkey.plain

Targets

    • Target

      2024-07-25_49de0cbd75e714e647749f752ed46c78_icedid_wapomi

    • Size

      212KB

    • MD5

      49de0cbd75e714e647749f752ed46c78

    • SHA1

      5d845b029a550d73364071c8d6ddccbfcc3cbf5c

    • SHA256

      6f6bac4133e06b5a0bb3a8dad3874f7c33b51319396896c60d2bdf9e9f77def9

    • SHA512

      e1f992bb075b28bc6ebe57ce3efc438c78bc3c84adf27d5271e6109e15ceefccb46452314ccab6abd4ce8ec8e9d811b8b62b9fa8ae1c9d0c847eac72c46d1dfc

    • SSDEEP

      3072:NRZLLKF311qOaUlc7XBGbuQickfJ4/sWjk3lGz5JuRQ6FSpuAHkruD+GCH:PC13aU2LYCVD4//D5J6FSp30K

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks