General

  • Target

    5c23db1256ed0c2bdfc78d0cc9509ad4_JaffaCakes118

  • Size

    108KB

  • Sample

    240729-yjcc1axcnj

  • MD5

    5c23db1256ed0c2bdfc78d0cc9509ad4

  • SHA1

    20824426bf095942a3362a86279234ca195e7d58

  • SHA256

    7c4b19cd857ae15b8a8d85ccc5951666dd9e00e60b86dbf1396e07432f74b045

  • SHA512

    cdff12cd8b7e304cac37aaf7f412c7276d05fdc5547a42122fed1cab2f87653ac615d359799bf514bab88789b652cbff2c4c75a01b668fa0974e412c0037470f

  • SSDEEP

    1536:MthMQIGU6agtJuXuBzsZlo4AJhBeP7jlCqizBC+Ez510yBmFFB8I:MthMIUB5epsZlo/cPXdsu1LqFB

Malware Config

Extracted

Family

emotet

Botnet

Epoch1

C2

192.81.38.31:80

51.75.33.127:80

37.157.196.117:7080

116.202.23.3:8080

54.37.42.48:8080

2.36.95.106:80

186.103.141.250:443

192.241.146.84:8080

94.176.234.118:443

12.162.84.2:8080

82.230.1.24:80

98.13.75.196:80

190.190.148.27:8080

177.129.17.170:443

202.4.58.197:80

77.90.136.129:8080

77.106.157.34:8080

95.9.180.128:80

83.169.21.32:7080

212.71.237.140:8080

rsa_pubkey.plain

Targets

    • Target

      5c23db1256ed0c2bdfc78d0cc9509ad4_JaffaCakes118

    • Size

      108KB

    • MD5

      5c23db1256ed0c2bdfc78d0cc9509ad4

    • SHA1

      20824426bf095942a3362a86279234ca195e7d58

    • SHA256

      7c4b19cd857ae15b8a8d85ccc5951666dd9e00e60b86dbf1396e07432f74b045

    • SHA512

      cdff12cd8b7e304cac37aaf7f412c7276d05fdc5547a42122fed1cab2f87653ac615d359799bf514bab88789b652cbff2c4c75a01b668fa0974e412c0037470f

    • SSDEEP

      1536:MthMQIGU6agtJuXuBzsZlo4AJhBeP7jlCqizBC+Ez510yBmFFB8I:MthMIUB5epsZlo/cPXdsu1LqFB

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Emotet payload

      Detects Emotet payload in memory.

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks