General

  • Target

    6e92a1fbafbc5bee0a4a5babd4041cbfdd9241c1cf7bd7da8f6ff4a688a811f3

  • Size

    3KB

  • Sample

    241120-tsfdsszekq

  • MD5

    cf21b34c7584ffa2b1e8f045b3bf8b6d

  • SHA1

    3b7043526a004d28b034621e3754a60d519e871d

  • SHA256

    6e92a1fbafbc5bee0a4a5babd4041cbfdd9241c1cf7bd7da8f6ff4a688a811f3

  • SHA512

    83cc7b098965ac35a70a764c68f95f290d9ec8d1ed8ff2f3dcbcaf61c17d36e662f98b6ef571fe8751721cc086ab1606bbb974c0aa437b963d17b164c8e91df3

Malware Config

Extracted

Family

emotet

Botnet

Epoch4

C2

149.56.131.28:8080

72.15.201.15:8080

207.148.79.14:8080

82.165.152.127:8080

46.55.222.11:443

213.241.20.155:443

163.44.196.120:8080

51.254.140.238:7080

107.170.39.149:8080

188.44.20.25:443

82.223.21.224:8080

172.104.251.154:8080

164.68.99.3:8080

101.50.0.91:8080

129.232.188.93:443

173.212.193.249:8080

103.132.242.26:8080

186.194.240.217:443

37.187.115.122:8080

91.207.28.33:8080

eck1.plain
ecs1.plain

Targets

    • Target

      6e92a1fbafbc5bee0a4a5babd4041cbfdd9241c1cf7bd7da8f6ff4a688a811f3

    • Size

      3KB

    • MD5

      cf21b34c7584ffa2b1e8f045b3bf8b6d

    • SHA1

      3b7043526a004d28b034621e3754a60d519e871d

    • SHA256

      6e92a1fbafbc5bee0a4a5babd4041cbfdd9241c1cf7bd7da8f6ff4a688a811f3

    • SHA512

      83cc7b098965ac35a70a764c68f95f290d9ec8d1ed8ff2f3dcbcaf61c17d36e662f98b6ef571fe8751721cc086ab1606bbb974c0aa437b963d17b164c8e91df3

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Emotet family

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

MITRE ATT&CK Enterprise v15

Tasks