General

  • Target

    e33f48ff5c6afda8973cdb927f55e31a3a7f87a5fab32937e71f92989261074f

  • Size

    205KB

  • Sample

    241120-2ytglsvejc

  • MD5

    7a1ad5bb856871b49eff4011e5824533

  • SHA1

    03986d05fc916ec383c1828fe7a3b3329759e926

  • SHA256

    e33f48ff5c6afda8973cdb927f55e31a3a7f87a5fab32937e71f92989261074f

  • SHA512

    51fce0512e5458d9e7c4caba09e2b0e30e2310db005c01433625533f4b4ae4a1cd6f6bd7b487f557d167e97a02ffd85747f735c975c49e87d91682dc05e16517

  • SSDEEP

    6144:Iwv6B4IgcHlxMKdUgs0p3zh1GTGexQ7w8eY1w:UB4IPl2b0Bzh1sVQMlY1

Malware Config

Extracted

Family

emotet

Botnet

Epoch1

C2

93.149.120.214:80

82.208.146.142:7080

138.197.99.250:8080

167.71.148.58:443

211.215.18.93:8080

185.94.252.27:443

70.32.84.74:8080

81.214.253.80:443

45.184.103.73:80

138.97.60.141:7080

191.241.233.198:80

209.236.123.42:8080

155.186.9.160:80

45.16.226.117:443

138.97.60.140:8080

192.232.229.54:7080

1.226.84.243:8080

190.64.88.186:443

46.105.114.137:8080

46.101.58.37:8080

rsa_pubkey.plain

Targets

    • Target

      e33f48ff5c6afda8973cdb927f55e31a3a7f87a5fab32937e71f92989261074f

    • Size

      205KB

    • MD5

      7a1ad5bb856871b49eff4011e5824533

    • SHA1

      03986d05fc916ec383c1828fe7a3b3329759e926

    • SHA256

      e33f48ff5c6afda8973cdb927f55e31a3a7f87a5fab32937e71f92989261074f

    • SHA512

      51fce0512e5458d9e7c4caba09e2b0e30e2310db005c01433625533f4b4ae4a1cd6f6bd7b487f557d167e97a02ffd85747f735c975c49e87d91682dc05e16517

    • SSDEEP

      6144:Iwv6B4IgcHlxMKdUgs0p3zh1GTGexQ7w8eY1w:UB4IPl2b0Bzh1sVQMlY1

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Emotet family

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks