General

  • Target

    2216-4-0x00000000002F0000-0x0000000000300000-memory.dmp

  • Size

    64KB

  • MD5

    e57362159b4016fd383a2e63350af05e

  • SHA1

    da14a12797dece3ae462d989ead456c7a1db15c2

  • SHA256

    42456891dffaddec16b6cfb3d64337b42b94e7e414409a0a01219c042899b431

  • SHA512

    5f018095a836aa29514cddcfc0b7544d52b7867969994c4cdfd02077139749885f47cc7063b8c7f9197f59b35e27565ad077cf2659bac22b0b528b4c881bbde7

  • SSDEEP

    768:mUljk+VszGrlBt//+AzKQw6omsQn2BN+7b2cazCmMKNuVOKyxQhyFpM70B66XCZW:WUsa7tBzKQL2BAb2omoUlVXK

Malware Config

Extracted

Family

emotet

Botnet

Epoch1

C2

202.22.141.45:80

37.187.161.206:8080

202.29.239.162:443

80.87.201.221:7080

82.76.111.249:443

216.47.196.104:80

192.241.143.52:8080

192.81.38.31:80

87.106.253.248:8080

64.201.88.132:80

192.241.146.84:8080

12.162.84.2:8080

1.226.84.243:8080

177.129.17.170:443

202.134.4.210:7080

70.169.17.134:80

152.169.22.67:80

5.196.35.138:7080

138.97.60.141:7080

203.205.28.68:80

rsa_pubkey.plain

Signatures

  • Emotet family
  • Emotet payload 1 IoCs

    Detects Emotet payload in memory.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2216-4-0x00000000002F0000-0x0000000000300000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections