General

  • Target

    d04d35d2c4987aafc58aefd26bf50638d734c9472a3f310b511c3337afff0f52

  • Size

    422KB

  • Sample

    241120-3bce9azpbl

  • MD5

    4a09000a5ba464fe24c46d483deb4aa9

  • SHA1

    d41ae6f6b2b1caa78bcd7e8beaa353a275591179

  • SHA256

    d04d35d2c4987aafc58aefd26bf50638d734c9472a3f310b511c3337afff0f52

  • SHA512

    a1b25d0f8f1f3540e8e880087888476e0c8a68887c7973cd9d418bef0474c2d4e7a8c80d9b448832737b018223110d4186e3f90124589d7e6610b822533582f2

  • SSDEEP

    12288:LZea8ws64LnPw5WG1yarjIUBO7p3wqXyZ7aiiJ3ET1:LZeaADLnPwVyYcJwqX/iW3ET1

Malware Config

Extracted

Family

emotet

Botnet

Epoch4

C2

169.197.131.16:8080

195.154.253.60:8080

152.89.239.34:443

216.158.226.206:443

159.65.88.10:8080

209.126.98.206:8080

158.69.222.101:443

173.212.193.249:8080

185.157.82.211:8080

81.0.236.90:443

103.75.201.2:443

46.55.222.11:443

159.8.59.82:8080

207.38.84.195:8080

50.116.54.215:443

79.172.212.216:8080

212.237.17.99:8080

212.24.98.99:8080

178.79.147.66:8080

51.254.140.238:7080

eck1.plain
ecs1.plain

Targets

    • Target

      07c151483a72d1e066845345b75efaa4b0bfb8d6f1f3b929a97bcbce41d26a4c

    • Size

      932KB

    • MD5

      41fce2240b35902e699ff67637798245

    • SHA1

      48629b443171962b9256878ff72401dea4c6188d

    • SHA256

      07c151483a72d1e066845345b75efaa4b0bfb8d6f1f3b929a97bcbce41d26a4c

    • SHA512

      b853678a33d02b8fc89886d40b25f197985991fef25d6381e9a0f28760391e24755d9f286ebb835057572cc2f3ac2b3cd70d4aaa0086a8539f9b9732b9c651dc

    • SSDEEP

      12288:ryS+zt4q0JSXaJBosLwlmZz7kg763Ewnv6n21wqXUZ7aiGJ3jMM:o4qUAaJxLZzIg760ii21wqXZia3j

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Emotet family

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks