General

  • Target

    cf85d33314d06e3d7864658c36d762169e1e3be36003d9cf8acc7ba73d6a1804

  • Size

    261KB

  • Sample

    241120-ztyvestfpk

  • MD5

    6937941d98e8cf3e6c260650457a76d4

  • SHA1

    f1afc4a1141494eee9cf348d990f96798cbdeb83

  • SHA256

    cf85d33314d06e3d7864658c36d762169e1e3be36003d9cf8acc7ba73d6a1804

  • SHA512

    25d372d24c1f776d3cc1bb77c6876aaa44ca779ebdfc92e29a2ec4a4f4fb1f4c8bac1ec3e5a80904b3fdb06433d5ea306edf435471addafeff247c14086d35b7

  • SSDEEP

    6144:RrXD5JOxa5mc9pwVyGdglGpLVJ0rbzocgX/9tyZRjE1:Rn5Mxa0Opw6CLVEbzocytsjE1

Malware Config

Extracted

Family

emotet

Botnet

Epoch5

C2

51.75.33.122:443

186.250.48.5:80

168.119.39.118:443

207.148.81.119:8080

194.9.172.107:8080

139.196.72.155:8080

78.47.204.80:443

159.69.237.188:443

45.71.195.104:8080

54.37.106.167:8080

185.168.130.138:443

37.44.244.177:8080

185.184.25.78:8080

185.148.168.15:8080

128.199.192.135:8080

37.59.209.141:8080

103.41.204.169:8080

185.148.168.220:8080

103.42.58.120:7080

78.46.73.125:443

eck1.plain
ecs1.plain

Targets

    • Target

      ff969a664ed8bb494ac0adee821279f2fcdf7483d2b02a82b9777d516ee97d14

    • Size

      400KB

    • MD5

      040aaf3b5e5c07237ad732b75110c459

    • SHA1

      489a92e54b919e5fb2414934ff1ba97a695c952b

    • SHA256

      ff969a664ed8bb494ac0adee821279f2fcdf7483d2b02a82b9777d516ee97d14

    • SHA512

      c6dc2adb18b971ad8170493cd83fa629758cda7e51321587e3851e92248621e9885fd190a1f6d7ed8bc1397fa400fd29e3a426ea5159502e3bdc111458c6dd23

    • SSDEEP

      6144:21PzaAmc94Mm2k46EgQBa2XWP62eGpLbJ0TbzocYloxo:gaE04Jgoa2Xa/Lbubzoc/x

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Emotet family

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks