General

  • Target

    875df36d5623e6bf413b96b78a8c025a4a1028f367bf464d4be66cd226bf42de

  • Size

    432KB

  • Sample

    241112-1ngvdsvpel

  • MD5

    af9d5db6c6f8d66bbda5a4d16b76796c

  • SHA1

    4d614705c2b67ced03400e01fefd8826f335ccb5

  • SHA256

    875df36d5623e6bf413b96b78a8c025a4a1028f367bf464d4be66cd226bf42de

  • SHA512

    bbc53fda5883eeb829ea741a6d59341e07aea0cac8ed77082fe75513e9312d5bfd78135f1bbd143cfaef05a28ba4ee5ef2b13a493a27e2711b789fb257b6a0b5

  • SSDEEP

    12288:rkEjer16eQSqXL4m1EiOS1OrX3sBqCjM7cuJc0ViQjnbbyADuCgs:rk2E1kEi1asBqCM7XiQjbFuO

Malware Config

Extracted

Family

emotet

Botnet

Epoch2

C2

24.231.88.85:80

191.112.178.60:80

50.116.111.59:8080

173.249.20.233:443

188.165.214.98:8080

74.40.205.197:443

62.75.141.82:80

2.58.16.89:8080

188.219.31.12:80

95.213.236.64:8080

72.186.136.247:443

185.201.9.197:8080

203.153.216.189:7080

202.134.4.216:8080

72.229.97.235:80

24.179.13.119:80

174.118.202.24:443

74.208.45.104:8080

51.89.36.180:443

202.141.243.254:443

rsa_pubkey.plain

Targets

    • Target

      875df36d5623e6bf413b96b78a8c025a4a1028f367bf464d4be66cd226bf42de

    • Size

      432KB

    • MD5

      af9d5db6c6f8d66bbda5a4d16b76796c

    • SHA1

      4d614705c2b67ced03400e01fefd8826f335ccb5

    • SHA256

      875df36d5623e6bf413b96b78a8c025a4a1028f367bf464d4be66cd226bf42de

    • SHA512

      bbc53fda5883eeb829ea741a6d59341e07aea0cac8ed77082fe75513e9312d5bfd78135f1bbd143cfaef05a28ba4ee5ef2b13a493a27e2711b789fb257b6a0b5

    • SSDEEP

      12288:rkEjer16eQSqXL4m1EiOS1OrX3sBqCjM7cuJc0ViQjnbbyADuCgs:rk2E1kEi1asBqCM7XiQjbFuO

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Emotet family

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks