General

  • Target

    d2d98c6a99f91898a76f7a878a7a5f8a08d0b55bc05b49d4319aa0b6b7d7525f

  • Size

    235KB

  • Sample

    241120-3n8dfswkft

  • MD5

    58e429ebc9ad3da651358e1db0c14078

  • SHA1

    7c1876c2bd30ea0c84bed7fa75560b2d1ec244ff

  • SHA256

    d2d98c6a99f91898a76f7a878a7a5f8a08d0b55bc05b49d4319aa0b6b7d7525f

  • SHA512

    b0f461794be9e79befa2a9836f713911afab2614ccddc2d0d1bbbc48730837857986564c52dfe20885c2e5ff6ac902f52ce48820ae633127236b1808c8182244

  • SSDEEP

    6144:tuaQ4jfujIA2XML0o8UENWS5j3n9a5AsGfjA:tdjfqDcMEj0SdX9QP

Malware Config

Extracted

Family

emotet

Botnet

Epoch3

C2

189.34.18.252:8080

189.211.214.19:443

203.157.152.9:7080

157.245.145.87:443

195.159.28.244:8080

202.29.237.113:8080

203.56.191.129:8080

46.32.229.152:8080

103.229.72.197:8080

190.194.12.132:80

157.7.164.178:8081

117.2.139.117:443

183.91.3.63:80

177.254.134.180:80

24.245.65.66:80

223.17.215.76:80

27.78.27.110:443

46.105.131.68:8080

79.133.6.236:8080

58.27.215.3:8080

rsa_pubkey.plain

Targets

    • Target

      3-Ard2eQaJX2oB.dll

    • Size

      502KB

    • MD5

      9b98850d35eea0ea455880bc31d763dd

    • SHA1

      87c261c060ae45f0e8503d82a1a60fab2bba7b0f

    • SHA256

      dee8101da98025b7556f84690a7530e0d22e49ce410273689281157ad831aff3

    • SHA512

      cbf3e1c975abee5778e669f3d4585b1e97c34c767f5dfd61ba8e934fc36504816623d9d83f856b236685273049a21940fdf354acb548c66c90315abcc654fb98

    • SSDEEP

      6144:0CILiotuWe/fWEfvXQ6tGHo0n9SiaFbmN:0CILdtuWeGSvXQ6tG5sia4

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Emotet family

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks