General

  • Target

    e3c7a54d5465df748482f6210e3925c0_JaffaCakes118

  • Size

    145KB

  • Sample

    240916-b4t28atbrj

  • MD5

    e3c7a54d5465df748482f6210e3925c0

  • SHA1

    b8e9c2cf73d259c8157d899fafd2096956d26d4e

  • SHA256

    14f46d768954dad28b8eb6b59124255b187c984306dc2ad3cad0ad6cc509993e

  • SHA512

    e085dbb2fe838ba0ea9b893c4549c3cb31deb4d0ca54650d758f1b65e0adc7660ba4c5cfebd9cf6f804710e3e286a0dc9eba1b5741f03535cf85bf9e386a93cd

  • SSDEEP

    3072:kyYIilXVCZV4xqbqP1AjTPsjuHY1sUycOo9EdAPioPZrnghGLOrigrcGN2:7zoMVuqePSHsMKOo9EdAPXPZLGGarmG

Malware Config

Extracted

Family

emotet

Botnet

Epoch1

C2

91.105.94.200:80

51.38.124.206:80

38.88.126.202:8080

54.37.42.48:8080

189.2.177.210:443

181.30.61.163:443

185.178.10.77:80

199.203.62.165:80

177.73.0.98:443

87.106.46.107:8080

5.196.35.138:7080

5.189.178.202:8080

185.183.16.47:80

78.249.119.122:80

191.182.6.118:80

96.227.52.8:443

186.103.141.250:443

50.28.51.143:8080

111.67.12.221:8080

50.121.220.50:80

rsa_pubkey.plain

Targets

    • Target

      e3c7a54d5465df748482f6210e3925c0_JaffaCakes118

    • Size

      145KB

    • MD5

      e3c7a54d5465df748482f6210e3925c0

    • SHA1

      b8e9c2cf73d259c8157d899fafd2096956d26d4e

    • SHA256

      14f46d768954dad28b8eb6b59124255b187c984306dc2ad3cad0ad6cc509993e

    • SHA512

      e085dbb2fe838ba0ea9b893c4549c3cb31deb4d0ca54650d758f1b65e0adc7660ba4c5cfebd9cf6f804710e3e286a0dc9eba1b5741f03535cf85bf9e386a93cd

    • SSDEEP

      3072:kyYIilXVCZV4xqbqP1AjTPsjuHY1sUycOo9EdAPioPZrnghGLOrigrcGN2:7zoMVuqePSHsMKOo9EdAPXPZLGGarmG

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Emotet payload

      Detects Emotet payload in memory.

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks