General

  • Target

    444afb61279aaf25f8166d9f23b9c56efb277cbe43dbbccef9f55407809842bf

  • Size

    3KB

  • Sample

    241120-3mjzgawkds

  • MD5

    9d6cf11e83532493480dd167924d2165

  • SHA1

    b83c252564e2cc4b1b17d9279fe42bf3cf6b6326

  • SHA256

    444afb61279aaf25f8166d9f23b9c56efb277cbe43dbbccef9f55407809842bf

  • SHA512

    eb9b02ebc40b7de47cb72dc18b8685f3c64cb880b914ea5f90ab21fed543ec7769ada6ba11173b769f9fb23e9e29aa98499d932c9b7588d6bb5c72dae2d8351e

Malware Config

Extracted

Family

emotet

Botnet

Epoch4

C2

149.56.131.28:8080

72.15.201.15:8080

207.148.79.14:8080

82.165.152.127:8080

46.55.222.11:443

213.241.20.155:443

163.44.196.120:8080

51.254.140.238:7080

107.170.39.149:8080

188.44.20.25:443

82.223.21.224:8080

172.104.251.154:8080

164.68.99.3:8080

101.50.0.91:8080

129.232.188.93:443

173.212.193.249:8080

103.132.242.26:8080

186.194.240.217:443

37.187.115.122:8080

91.207.28.33:8080

eck1.plain
ecs1.plain

Targets

    • Target

      444afb61279aaf25f8166d9f23b9c56efb277cbe43dbbccef9f55407809842bf

    • Size

      3KB

    • MD5

      9d6cf11e83532493480dd167924d2165

    • SHA1

      b83c252564e2cc4b1b17d9279fe42bf3cf6b6326

    • SHA256

      444afb61279aaf25f8166d9f23b9c56efb277cbe43dbbccef9f55407809842bf

    • SHA512

      eb9b02ebc40b7de47cb72dc18b8685f3c64cb880b914ea5f90ab21fed543ec7769ada6ba11173b769f9fb23e9e29aa98499d932c9b7588d6bb5c72dae2d8351e

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Emotet family

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

MITRE ATT&CK Enterprise v15

Tasks