General

  • Target

    15bc0895b74de366ae8e1510bcb43030N.exe

  • Size

    400KB

  • Sample

    240906-yye3fawamm

  • MD5

    15bc0895b74de366ae8e1510bcb43030

  • SHA1

    8a3127d73ffe10f805dc8f58a517f1b940bf7769

  • SHA256

    3727cb32b79ddf049caa252d943156883d823d9983ae81150c2e1f510b88db20

  • SHA512

    8708d458ec47a81c643edb2df852bba272fd37fb2cabca532e6a9f3982676efb1581fe2c3c8852f2f64a86e14dc9c471c0d1074b4b0ceca7fea3e8dc0e24b9f6

  • SSDEEP

    3072:eKQAYgKEzPP7BDV2WNbX+Ob5C7se89qjkD6Kd/Y+oQ6vDJ1Es7uKE2YAmU7viNxF:kAdTBDPN7+wPe8QjW64oQ6LJ1/iN

Malware Config

Extracted

Family

emotet

Botnet

Epoch2

C2

104.193.103.61:80

104.131.123.136:443

5.196.108.189:8080

121.124.124.40:7080

87.106.139.101:8080

213.196.135.145:80

50.35.17.13:80

38.18.235.242:80

24.43.32.186:80

82.80.155.43:80

103.86.49.11:8080

113.61.66.94:80

24.137.76.62:80

187.49.206.134:80

42.200.107.142:80

24.179.13.119:80

93.147.212.206:80

108.46.29.236:80

105.186.233.33:80

37.139.21.175:8080

rsa_pubkey.plain

Targets

    • Target

      15bc0895b74de366ae8e1510bcb43030N.exe

    • Size

      400KB

    • MD5

      15bc0895b74de366ae8e1510bcb43030

    • SHA1

      8a3127d73ffe10f805dc8f58a517f1b940bf7769

    • SHA256

      3727cb32b79ddf049caa252d943156883d823d9983ae81150c2e1f510b88db20

    • SHA512

      8708d458ec47a81c643edb2df852bba272fd37fb2cabca532e6a9f3982676efb1581fe2c3c8852f2f64a86e14dc9c471c0d1074b4b0ceca7fea3e8dc0e24b9f6

    • SSDEEP

      3072:eKQAYgKEzPP7BDV2WNbX+Ob5C7se89qjkD6Kd/Y+oQ6vDJ1Es7uKE2YAmU7viNxF:kAdTBDPN7+wPe8QjW64oQ6LJ1/iN

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Emotet payload

      Detects Emotet payload in memory.

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Discovery

System Information Discovery

1
T1082

System Location Discovery

1
T1614

System Language Discovery

1
T1614.001

Tasks