General

  • Target

    d15c14035e92e741a6a6367c0e1579eb_JaffaCakes118

  • Size

    408KB

  • Sample

    240907-hzgdws1emm

  • MD5

    d15c14035e92e741a6a6367c0e1579eb

  • SHA1

    de03b3532e51552f0667bfb058c67ef6e32e2167

  • SHA256

    a29dee282f8f8319171f1e28018996bcea5975abfc012412f1dcd491eaf0c792

  • SHA512

    f7da5c1057b574cdfd88064a0a363b0c91effc4a368c7fc275edce266ff3b5ce64a07e2bb9150caa1cf891fd597823d38baec38b040b91e990a22a2cdf47136c

  • SSDEEP

    6144:3nOIweNsFS+Ei3m/Yiku0sd3jyOfH8sHpenQFUs2ax:3nfweNEe1yOfH8sEQSs2ax

Malware Config

Extracted

Family

emotet

Botnet

Epoch1

C2

128.92.203.42:80

37.187.161.206:8080

202.29.239.162:443

80.87.201.221:7080

190.188.245.242:80

12.163.208.58:80

213.197.182.158:8080

201.213.177.139:80

62.84.75.50:80

45.33.77.42:8080

185.183.16.47:80

78.249.119.122:80

177.129.17.170:443

51.15.7.189:80

152.169.22.67:80

119.106.216.84:80

109.169.12.78:80

51.15.7.145:80

219.92.13.25:80

190.117.79.209:80

rsa_pubkey.plain

Targets

    • Target

      d15c14035e92e741a6a6367c0e1579eb_JaffaCakes118

    • Size

      408KB

    • MD5

      d15c14035e92e741a6a6367c0e1579eb

    • SHA1

      de03b3532e51552f0667bfb058c67ef6e32e2167

    • SHA256

      a29dee282f8f8319171f1e28018996bcea5975abfc012412f1dcd491eaf0c792

    • SHA512

      f7da5c1057b574cdfd88064a0a363b0c91effc4a368c7fc275edce266ff3b5ce64a07e2bb9150caa1cf891fd597823d38baec38b040b91e990a22a2cdf47136c

    • SSDEEP

      6144:3nOIweNsFS+Ei3m/Yiku0sd3jyOfH8sHpenQFUs2ax:3nfweNEe1yOfH8sEQSs2ax

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Emotet payload

      Detects Emotet payload in memory.

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Discovery

System Information Discovery

1
T1082

System Location Discovery

1
T1614

System Language Discovery

1
T1614.001

Tasks