General

  • Target

    0e1263bdd1e30ffd318607ef28736f531d7776ce569f609f81709b6b4306544e

  • Size

    387KB

  • Sample

    241113-vvq4rawfkk

  • MD5

    a235da01e48cdc4632d63ca29746a86a

  • SHA1

    f78f2af1a54901dc02d1824afac2299ffb6289e5

  • SHA256

    0e1263bdd1e30ffd318607ef28736f531d7776ce569f609f81709b6b4306544e

  • SHA512

    3bf3f40f957f3bdae6a74e55d31231d9cc745f27d878cfd2739aba529605f84d3401533e18f7d9d1d4790b8dec2e8cb004dc04230a295c604570cd74266639e2

  • SSDEEP

    6144:NonAnCc/9tV+RfOu6Ypj07F5xaPMJZ8iG++sRJc:NonACc/R+RfOdej0VaPMoiN+x

Malware Config

Extracted

Family

emotet

Botnet

Epoch1

C2

45.4.32.50:80

170.81.48.2:80

167.71.148.58:443

211.215.18.93:8080

1.234.65.61:80

217.13.106.14:8080

12.163.208.58:80

178.250.54.208:8080

82.76.111.249:443

202.134.4.210:7080

172.245.248.239:8080

84.5.104.93:80

209.236.123.42:8080

192.175.111.212:7080

190.24.243.186:80

68.183.170.114:8080

187.39.237.56:8080

1.226.84.243:8080

191.182.6.118:80

152.169.22.67:80

rsa_pubkey.plain

Targets

    • Target

      0e1263bdd1e30ffd318607ef28736f531d7776ce569f609f81709b6b4306544e

    • Size

      387KB

    • MD5

      a235da01e48cdc4632d63ca29746a86a

    • SHA1

      f78f2af1a54901dc02d1824afac2299ffb6289e5

    • SHA256

      0e1263bdd1e30ffd318607ef28736f531d7776ce569f609f81709b6b4306544e

    • SHA512

      3bf3f40f957f3bdae6a74e55d31231d9cc745f27d878cfd2739aba529605f84d3401533e18f7d9d1d4790b8dec2e8cb004dc04230a295c604570cd74266639e2

    • SSDEEP

      6144:NonAnCc/9tV+RfOu6Ypj07F5xaPMJZ8iG++sRJc:NonACc/R+RfOdej0VaPMoiN+x

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Emotet family

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks