General

  • Target

    b569bf074cd69d84eafae45b0ea13c37849f9a855169fc7fdd657b9cdc746c4b

  • Size

    433KB

  • Sample

    241120-3esxeawjbz

  • MD5

    63c5c5eb144b0dc83a876a891437e265

  • SHA1

    dd4944cb1c3e8b855ae117109afe3fcccf4f99aa

  • SHA256

    b569bf074cd69d84eafae45b0ea13c37849f9a855169fc7fdd657b9cdc746c4b

  • SHA512

    e5df66b8f3408d047a16a7534e12038cc7b1b9733cc7618b91f2e25a2f1dc8d545e3795bf0d009736c812da3f7803d5c99801e4068e88f95496098d94a26422c

  • SSDEEP

    12288:w3zKxZ14g1hxgsjtuEiiSFdgiAbj1qiua2jB3BSVyfYzP:a2Z1CEiTFJAbZqLBx4yKP

Malware Config

Extracted

Family

emotet

Botnet

Epoch3

C2

113.161.176.235:80

88.247.30.64:80

89.163.210.141:8080

139.162.10.249:8080

203.157.152.9:7080

109.99.146.210:8080

78.90.78.210:80

172.193.14.201:80

157.7.164.178:8081

189.211.214.19:443

157.245.145.87:443

180.148.4.130:8080

46.32.229.152:8080

24.245.65.66:80

82.78.179.117:443

177.130.51.198:80

121.117.147.153:443

203.160.167.243:80

172.104.46.84:8080

202.29.237.113:8080

rsa_pubkey.plain

Targets

    • Target

      b569bf074cd69d84eafae45b0ea13c37849f9a855169fc7fdd657b9cdc746c4b

    • Size

      433KB

    • MD5

      63c5c5eb144b0dc83a876a891437e265

    • SHA1

      dd4944cb1c3e8b855ae117109afe3fcccf4f99aa

    • SHA256

      b569bf074cd69d84eafae45b0ea13c37849f9a855169fc7fdd657b9cdc746c4b

    • SHA512

      e5df66b8f3408d047a16a7534e12038cc7b1b9733cc7618b91f2e25a2f1dc8d545e3795bf0d009736c812da3f7803d5c99801e4068e88f95496098d94a26422c

    • SSDEEP

      12288:w3zKxZ14g1hxgsjtuEiiSFdgiAbj1qiua2jB3BSVyfYzP:a2Z1CEiTFJAbZqLBx4yKP

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Emotet family

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks