Overview
overview
10Static
static
100864575d4f...a0.dll
windows7-x64
30864575d4f...a0.dll
windows10-2004-x64
3933511776c...82.dll
windows7-x64
10933511776c...82.dll
windows10-2004-x64
1062bc8624b6...18.exe
windows7-x64
1062bc8624b6...18.exe
windows10-2004-x64
10bea9fc6693...3a.exe
windows7-x64
10bea9fc6693...3a.exe
windows10-2004-x64
10emotet_exe...44.dll
windows7-x64
10emotet_exe...44.dll
windows10-2004-x64
103ec811757a...e9.exe
windows7-x64
103ec811757a...e9.exe
windows10-2004-x64
1057800373ef...15.dll
windows7-x64
357800373ef...15.dll
windows10-2004-x64
361a47ebee9...f9.dll
windows7-x64
1061a47ebee9...f9.dll
windows10-2004-x64
10General
-
Target
975ec4a6250960b45606ce9c155560c3283a3df4ffab69ec81f8cabdbc714b0e
-
Size
7.0MB
-
Sample
240923-pc3f6swdkq
-
MD5
5d38df343650fc8ffb48fd7b2d9ab480
-
SHA1
6dc3380f3952d06e446a10819a17196366221f1c
-
SHA256
975ec4a6250960b45606ce9c155560c3283a3df4ffab69ec81f8cabdbc714b0e
-
SHA512
202f2e6920d09c946408ac19922797a8cebda81417d82b5085a2d5be17b857d215d8ab29bbee4619c18657242f75059796cc4f59c07f07fd145ea722867a8acf
-
SSDEEP
196608:MSm1UwXO5KKD++70lt0qpFalPd1ULrE+B8hBEAYJJn6UOmp:y1U5KKD+jjRpFMArE+ByErJJn6UO6
Behavioral task
behavioral1
Sample
0864575d4f487e52a1479c61c2c4ad16742d92e16d0c10f5ed2b40506bbc6ca0.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0864575d4f487e52a1479c61c2c4ad16742d92e16d0c10f5ed2b40506bbc6ca0.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
933511776c5c34172b315807d11ecdd0c802f94492cace5c7127d1ddf47b2c82.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
933511776c5c34172b315807d11ecdd0c802f94492cace5c7127d1ddf47b2c82.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
62bc8624b6ed645ddbe1420ca67376863c88e58e347fc8282001a2b9e3330918.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
62bc8624b6ed645ddbe1420ca67376863c88e58e347fc8282001a2b9e3330918.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
bea9fc669319cd16df759974397e79c05e7565e75ca7c052af346e08b5f1d13a.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
bea9fc669319cd16df759974397e79c05e7565e75ca7c052af346e08b5f1d13a.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
emotet_exe_e5_53d5a86b1cb032154775e725ed728ba4bd819d40f3a541744661fcbd4d702319_2022-04-19__000144.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
emotet_exe_e5_53d5a86b1cb032154775e725ed728ba4bd819d40f3a541744661fcbd4d702319_2022-04-19__000144.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
3ec811757abece5eeb8d73fce8770390b5714b16e075c2558de050205cd8c8e9.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
3ec811757abece5eeb8d73fce8770390b5714b16e075c2558de050205cd8c8e9.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
57800373ef6281de3f09ea995703c2307c548717622244573a76e843a9c7b115.dll
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
57800373ef6281de3f09ea995703c2307c548717622244573a76e843a9c7b115.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
61a47ebee921db8a16a8f070edcb86b5efd47a8d185bf4691b57e76f697981f9.dll
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
s1.20mb.nl - Port:
587 - Username:
[email protected] - Password:
Regina8712 - Email To:
[email protected]
https://api.telegram.org/bot5009732133:AAFwMXIJpYDoCsKxNrSeGLfpeTo8-WB2wh8/sendDocument
Extracted
emotet
5.189.160.61:443
94.177.178.26:8080
202.29.239.162:443
54.38.143.246:7080
119.59.125.140:8080
185.148.168.15:8080
188.166.229.148:443
2.58.16.87:8080
104.131.62.48:8080
103.82.248.59:7080
37.59.209.141:8080
103.133.214.242:8080
195.77.239.39:8080
128.199.192.135:8080
78.47.204.80:443
59.148.253.194:443
87.106.97.83:7080
45.71.195.104:8080
85.214.67.203:8080
139.196.72.155:8080
210.57.209.142:8080
194.9.172.107:8080
116.124.128.206:8080
118.98.72.86:443
203.153.216.46:443
202.28.34.99:8080
54.37.228.122:443
202.134.4.210:7080
88.217.172.165:8080
196.44.98.190:8080
195.154.146.35:443
217.182.143.207:443
36.67.23.59:443
207.148.81.119:8080
190.90.233.66:443
66.42.57.149:443
85.25.120.45:8080
93.104.209.107:8080
68.183.93.250:443
103.42.58.120:7080
5.56.132.177:8080
159.69.237.188:443
51.68.141.164:8080
54.37.106.167:8080
198.199.98.78:8080
54.38.242.185:443
62.171.178.147:8080
37.44.244.177:8080
103.41.204.169:8080
78.46.73.125:443
185.148.168.220:8080
191.252.103.16:80
175.126.176.79:8080
Extracted
emotet
Epoch2
69.38.130.14:80
195.159.28.230:8080
162.241.204.233:8080
181.165.68.127:80
49.205.182.134:80
190.251.200.206:80
139.59.60.244:8080
119.59.116.21:8080
89.216.122.92:80
185.94.252.104:443
70.92.118.112:80
78.24.219.147:8080
173.70.61.180:80
87.106.139.101:8080
66.57.108.14:443
24.179.13.119:80
121.124.124.40:7080
61.19.246.238:443
200.116.145.225:443
93.146.48.84:80
188.219.31.12:80
78.188.225.105:80
144.217.7.207:7080
167.114.153.111:8080
157.245.99.39:8080
50.116.111.59:8080
109.116.245.80:80
79.130.130.240:8080
168.235.67.138:7080
70.183.211.3:80
85.105.205.77:8080
74.208.45.104:8080
12.175.220.98:80
104.131.11.150:443
41.185.28.84:8080
217.20.166.178:7080
202.134.4.216:8080
138.68.87.218:443
123.176.25.234:80
75.113.193.72:80
74.128.121.17:80
172.125.40.123:80
180.222.161.85:80
139.162.60.124:8080
89.106.251.163:80
190.240.194.77:443
115.94.207.99:443
37.187.72.193:8080
190.103.228.24:80
24.231.88.85:80
172.105.13.66:443
120.150.60.189:80
220.245.198.194:80
69.49.88.46:80
187.161.206.24:80
115.21.224.117:80
174.118.202.24:443
120.150.218.241:443
110.145.101.66:443
108.53.88.101:443
37.139.21.175:8080
176.111.60.55:8080
79.137.83.50:443
59.21.235.119:80
74.58.215.226:80
136.244.110.184:8080
71.72.196.159:80
5.39.91.110:7080
188.165.214.98:8080
85.105.111.166:80
95.9.5.93:80
109.74.5.95:8080
202.134.4.211:8080
110.145.11.73:80
134.209.144.106:443
2.58.16.89:8080
95.213.236.64:8080
24.178.90.49:80
194.190.67.75:80
186.74.215.34:80
98.109.133.80:80
161.0.153.60:80
181.171.209.241:443
75.177.207.146:80
194.4.58.192:7080
172.104.97.173:8080
78.189.148.42:80
51.89.36.180:443
24.69.65.8:8080
50.91.114.38:80
197.211.245.21:80
46.105.131.79:8080
185.201.9.197:8080
203.153.216.189:7080
78.182.254.231:80
110.142.236.207:80
118.83.154.64:443
24.164.79.147:8080
74.40.205.197:443
75.109.111.18:80
62.75.141.82:80
172.86.188.251:8080
Extracted
emotet
Epoch5
5.189.160.61:443
94.177.178.26:8080
202.29.239.162:443
54.38.143.246:7080
119.59.125.140:8080
185.148.168.15:8080
188.166.229.148:443
2.58.16.87:8080
104.131.62.48:8080
103.82.248.59:7080
37.59.209.141:8080
103.133.214.242:8080
195.77.239.39:8080
128.199.192.135:8080
78.47.204.80:443
59.148.253.194:443
87.106.97.83:7080
45.71.195.104:8080
85.214.67.203:8080
139.196.72.155:8080
210.57.209.142:8080
194.9.172.107:8080
116.124.128.206:8080
118.98.72.86:443
203.153.216.46:443
202.28.34.99:8080
54.37.228.122:443
202.134.4.210:7080
88.217.172.165:8080
196.44.98.190:8080
195.154.146.35:443
217.182.143.207:443
36.67.23.59:443
207.148.81.119:8080
190.90.233.66:443
66.42.57.149:443
85.25.120.45:8080
93.104.209.107:8080
68.183.93.250:443
103.42.58.120:7080
5.56.132.177:8080
159.69.237.188:443
51.68.141.164:8080
54.37.106.167:8080
198.199.98.78:8080
54.38.242.185:443
62.171.178.147:8080
37.44.244.177:8080
103.41.204.169:8080
78.46.73.125:443
185.148.168.220:8080
191.252.103.16:80
175.126.176.79:8080
Extracted
emotet
Epoch4
131.100.24.231:80
209.59.138.75:7080
103.8.26.103:8080
51.38.71.0:443
212.237.17.99:8080
79.172.212.216:8080
207.38.84.195:8080
104.168.155.129:8080
178.79.147.66:8080
46.55.222.11:443
103.8.26.102:8080
192.254.71.210:443
45.176.232.124:443
203.114.109.124:443
51.68.175.8:8080
58.227.42.236:80
45.142.114.231:8080
217.182.143.207:443
178.63.25.185:443
45.118.115.99:8080
103.75.201.2:443
104.251.214.46:8080
158.69.222.101:443
81.0.236.90:443
45.118.135.203:7080
176.104.106.96:8080
212.237.56.116:7080
216.158.226.206:443
173.212.193.249:8080
50.116.54.215:443
138.185.72.26:8080
41.76.108.46:8080
212.237.5.209:443
107.182.225.142:8080
195.154.133.20:443
162.214.50.39:7080
110.232.117.186:8080
Targets
-
-
Target
0864575d4f487e52a1479c61c2c4ad16742d92e16d0c10f5ed2b40506bbc6ca0.dll
-
Size
225KB
-
MD5
72ba727d7441954ecaefd9732d12a36c
-
SHA1
ab291a932bcc1c74231a7a7fda74017956927f37
-
SHA256
0864575d4f487e52a1479c61c2c4ad16742d92e16d0c10f5ed2b40506bbc6ca0
-
SHA512
8080baf789cfcf2edd481e581c4cd174340b36a159707c21506693085f70b60c82207af9e778468106734ebeba83f647b49805712eefbb50056ad6860aa36ac8
-
SSDEEP
3072:gjm1AMcU4GexYvBitvoAjwD0ggLSnWz/E75oNzbmC9LLxvNDrHj2YuG2TaB:R18UNe66vo1D0cEe5QiC9XxvNDLTu
Score3/10 -
-
-
Target
933511776c5c34172b315807d11ecdd0c802f94492cace5c7127d1ddf47b2c82
-
Size
735KB
-
MD5
14e8fc68273e3cc5377ea8efd0230273
-
SHA1
49069bf64828b11730c36f112fde9131c3c86a63
-
SHA256
933511776c5c34172b315807d11ecdd0c802f94492cace5c7127d1ddf47b2c82
-
SHA512
6cbf4d197b8fabfccbfb516acd4c11cb23934c3606e8ade1cfcf3845e2748405fb3b2d2012ad052607e4e959aea2bc75365ee9d8ca2bba7d1f4e1074ca35568a
-
SSDEEP
12288:agvTeqrCeX329Soy/O+TCJJU2QyDqXkkpodzR6TqKCKDeS:tviEdX3Y7GTCRhukkpbqUx
-
-
-
Target
62bc8624b6ed645ddbe1420ca67376863c88e58e347fc8282001a2b9e3330918
-
Size
574KB
-
MD5
00fe3f2a77b6bb57385d403411d45e39
-
SHA1
ad101cb7eab390ed45ec84294da65059aa2fde70
-
SHA256
62bc8624b6ed645ddbe1420ca67376863c88e58e347fc8282001a2b9e3330918
-
SHA512
b7fedd8e92b2569130df1faa8cfd5736d457c98991d0a14ce059e05b37bea79e36cd970d06510b4397c08333737d166c8e7121c037713e35fd5fabe53290aa13
-
SSDEEP
12288:YmEUG3Ap0FzZL2gSOfVxTaSaSehhjtrS2KlP:Yrp3E0FzZDSm3W+IU
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Drops file in Drivers directory
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-
-
-
Target
bea9fc669319cd16df759974397e79c05e7565e75ca7c052af346e08b5f1d13a.exe
-
Size
216KB
-
MD5
f491169c61e8aa6cfa83e00c3f7e85e2
-
SHA1
91b843f4747ae0a97f83b6cba7f329f6a1503928
-
SHA256
bea9fc669319cd16df759974397e79c05e7565e75ca7c052af346e08b5f1d13a
-
SHA512
e0c2a061404f9d0333c62366e6974445eb6349f6a900b5c7fe40fa9c6f74c94637f2ca0bc9fc03dfed7b654312dfc89b5f92602caf9699f0b22ed28ae9f0ea8d
-
SSDEEP
3072:7GWebH9OGNKb/ApyjbFSHZUsSeiMeK++koKcqIQKUsWlB32wufpxSkVPs6v9cwxe:7ejpyjA5UbMX+n7O/Wld23dzopTk
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
-
-
Target
emotet_exe_e5_53d5a86b1cb032154775e725ed728ba4bd819d40f3a541744661fcbd4d702319_2022-04-19__000144._exe
-
Size
1004KB
-
MD5
4af826422ed9b2cc498c34a52eee464e
-
SHA1
b91c6461240eb02acfbf747af5836823996c3aae
-
SHA256
a895a16793403c5df0710672bfaa69b0f096742b6b826bbe80040f23846dc202
-
SHA512
b0333004374595d8b720c96e2490dae6e89a45d30b64cf3afa17b04fed2705a914222e6905fd3ad16115a4a03f4c4603e3e4a3ba2d4a6e4da112cfc6843af19d
-
SSDEEP
12288:6caLILOJcC7Mx3NFvVP9orVD2dotpdLRKN5tFjNRLU:6caLIqJcxF9WrVD2kpdobLU
-
Loads dropped DLL
-
Drops file in System32 directory
-
-
-
Target
3ec811757abece5eeb8d73fce8770390b5714b16e075c2558de050205cd8c8e9.exe
-
Size
500KB
-
MD5
34f89cd2763bdd24f013b61db2464f2b
-
SHA1
5ed1562833b1b71e9a260a338fcdcee38adaf67e
-
SHA256
3ec811757abece5eeb8d73fce8770390b5714b16e075c2558de050205cd8c8e9
-
SHA512
72afdb1d68e759965627a979791c6705f0db6ac0ca8e901b04e9b8b6b3f1a4a47fe2454c177d53880823b597cbd2955f381912ac9c7d4259d973c0cf2f090151
-
SSDEEP
12288:c1P4SvDv8qRp8prpcHgcbR1nO/O3tw+i2hh:c1b/HXbRexg
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-
-
-
Target
57800373ef6281de3f09ea995703c2307c548717622244573a76e843a9c7b115
-
Size
133KB
-
MD5
f946be853b2174b95b27788effbabefc
-
SHA1
bb7b83482afb93ce683186d42f665f0c3e27de35
-
SHA256
57800373ef6281de3f09ea995703c2307c548717622244573a76e843a9c7b115
-
SHA512
6bb01a0ee788ae4573350b5db80cee321254427544cdd89fd2f6fea66e402e8ab12bbb6e5e6f5400c44a48790885f2eed0875bff2db6efedc9f767481b6774f5
-
SSDEEP
3072:vvQzFb+gUTFYRK9idY3U6n/ki/iD0OZ/+psw/1:vvQJbzawK9iK3//kiqD0oGpsw/1
Score3/10 -
-
-
Target
61a47ebee921db8a16a8f070edcb86b5efd47a8d185bf4691b57e76f697981f9.bin
-
Size
124KB
-
MD5
6c69bc006e9006849d4041f93806fb96
-
SHA1
57c70a4a5dea8e77cd4c412f8a6c997872a1a379
-
SHA256
61a47ebee921db8a16a8f070edcb86b5efd47a8d185bf4691b57e76f697981f9
-
SHA512
b8c5e2ba08b676b34de2d3e9d1fa09fcabfc7189c3261cde4f035389a297b78f40fcc64a002d09af606e349281e9be340b53ba93f321dee92a341f30d6396bad
-
SSDEEP
3072:/u5tHNpD8QLG/qDhOabqFFgVEOJe2rYUWPkQFisz:/u5ttpQQLGQWFSeYHmF
-
Blocklisted process makes network request
-
Loads dropped DLL
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1