General

  • Target

    c53fb748347ddb69ecf53d76d256fbe891d8962cc1b75c3535339e9012863e4e

  • Size

    429KB

  • Sample

    241120-2yy24awcrm

  • MD5

    77de4bdd2055dc2eafa8739d87bf7e6a

  • SHA1

    63e512bf1023eda3fdef665ca1b62b7e7143a851

  • SHA256

    c53fb748347ddb69ecf53d76d256fbe891d8962cc1b75c3535339e9012863e4e

  • SHA512

    27a7bc933e2b4bd4c96414ef272b7cdd7c277aef33175c0fadc0a692f5b13ff4c6e4d31805b6aa3d8327025fcd75e433758f3feb0c147b076e8a167f8dacbd5d

  • SSDEEP

    12288:ot0je21huDiqirIXREi+SoOJITmR6ObY/Yu5cA00YKmwCbq5:ot+x1MEiFjXR6+Y/5YKmtq5

Malware Config

Extracted

Family

emotet

Botnet

Epoch1

C2

45.4.32.50:80

170.81.48.2:80

167.71.148.58:443

211.215.18.93:8080

1.234.65.61:80

217.13.106.14:8080

12.163.208.58:80

178.250.54.208:8080

82.76.111.249:443

202.134.4.210:7080

172.245.248.239:8080

84.5.104.93:80

209.236.123.42:8080

192.175.111.212:7080

190.24.243.186:80

68.183.170.114:8080

187.39.237.56:8080

1.226.84.243:8080

191.182.6.118:80

152.169.22.67:80

rsa_pubkey.plain

Targets

    • Target

      c53fb748347ddb69ecf53d76d256fbe891d8962cc1b75c3535339e9012863e4e

    • Size

      429KB

    • MD5

      77de4bdd2055dc2eafa8739d87bf7e6a

    • SHA1

      63e512bf1023eda3fdef665ca1b62b7e7143a851

    • SHA256

      c53fb748347ddb69ecf53d76d256fbe891d8962cc1b75c3535339e9012863e4e

    • SHA512

      27a7bc933e2b4bd4c96414ef272b7cdd7c277aef33175c0fadc0a692f5b13ff4c6e4d31805b6aa3d8327025fcd75e433758f3feb0c147b076e8a167f8dacbd5d

    • SSDEEP

      12288:ot0je21huDiqirIXREi+SoOJITmR6ObY/Yu5cA00YKmwCbq5:ot+x1MEiFjXR6+Y/5YKmtq5

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Emotet family

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks