General

  • Target

    cac8969e4228ece50eff6f6b1118b741d4b83e75afdf77f24b11a00c71002dc3

  • Size

    3KB

  • Sample

    241115-s6x1bsxamp

  • MD5

    6d0a5bd01be8bf131f280e97cd518d00

  • SHA1

    bf454f9911bdc879f3612021a0eea1b06bf9d787

  • SHA256

    cac8969e4228ece50eff6f6b1118b741d4b83e75afdf77f24b11a00c71002dc3

  • SHA512

    575bed8ecd7a2c11ed657091178494da39084bec7cdbff4b5db1b6b820751ff62876b9604c479a1c78a97410b8ee04e4c56bc69e6b48ad7b31c938bcc7625681

Malware Config

Extracted

Family

emotet

Botnet

Epoch4

C2

149.56.131.28:8080

72.15.201.15:8080

207.148.79.14:8080

82.165.152.127:8080

46.55.222.11:443

213.241.20.155:443

163.44.196.120:8080

51.254.140.238:7080

107.170.39.149:8080

188.44.20.25:443

82.223.21.224:8080

172.104.251.154:8080

164.68.99.3:8080

101.50.0.91:8080

129.232.188.93:443

173.212.193.249:8080

103.132.242.26:8080

186.194.240.217:443

37.187.115.122:8080

91.207.28.33:8080

eck1.plain
ecs1.plain

Targets

    • Target

      cac8969e4228ece50eff6f6b1118b741d4b83e75afdf77f24b11a00c71002dc3

    • Size

      3KB

    • MD5

      6d0a5bd01be8bf131f280e97cd518d00

    • SHA1

      bf454f9911bdc879f3612021a0eea1b06bf9d787

    • SHA256

      cac8969e4228ece50eff6f6b1118b741d4b83e75afdf77f24b11a00c71002dc3

    • SHA512

      575bed8ecd7a2c11ed657091178494da39084bec7cdbff4b5db1b6b820751ff62876b9604c479a1c78a97410b8ee04e4c56bc69e6b48ad7b31c938bcc7625681

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Emotet family

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

MITRE ATT&CK Enterprise v15

Tasks