General

  • Target

    47e7f4b4645dd6eddcbf451148291f8ce270234a4221d69399baef33095207ac

  • Size

    432KB

  • Sample

    241121-a38njswhjg

  • MD5

    5c12d147c8b6768e802adfe1d7da5288

  • SHA1

    90eeab87c2a03051590393e582c35142e05d682e

  • SHA256

    47e7f4b4645dd6eddcbf451148291f8ce270234a4221d69399baef33095207ac

  • SHA512

    6c518ac89c18f4ff130008912f9e2f31c0a7887b9db75fcfaf263f45c3fde37a2e41b445091022d227032c9f5d9ed4d71cc6e630d1d1a05874ff9688abd82139

  • SSDEEP

    12288:rkEjer16eQSqXL4m1EiOS1OrX3sBqCjM7cuJcHViQjnbbyADuCgs:rk2E1kEi1asBqCM7QiQjbFuO

Malware Config

Extracted

Family

emotet

Botnet

Epoch2

C2

24.231.88.85:80

191.112.178.60:80

50.116.111.59:8080

173.249.20.233:443

188.165.214.98:8080

74.40.205.197:443

62.75.141.82:80

2.58.16.89:8080

188.219.31.12:80

95.213.236.64:8080

72.186.136.247:443

185.201.9.197:8080

203.153.216.189:7080

202.134.4.216:8080

72.229.97.235:80

24.179.13.119:80

174.118.202.24:443

74.208.45.104:8080

51.89.36.180:443

202.141.243.254:443

rsa_pubkey.plain

Targets

    • Target

      47e7f4b4645dd6eddcbf451148291f8ce270234a4221d69399baef33095207ac

    • Size

      432KB

    • MD5

      5c12d147c8b6768e802adfe1d7da5288

    • SHA1

      90eeab87c2a03051590393e582c35142e05d682e

    • SHA256

      47e7f4b4645dd6eddcbf451148291f8ce270234a4221d69399baef33095207ac

    • SHA512

      6c518ac89c18f4ff130008912f9e2f31c0a7887b9db75fcfaf263f45c3fde37a2e41b445091022d227032c9f5d9ed4d71cc6e630d1d1a05874ff9688abd82139

    • SSDEEP

      12288:rkEjer16eQSqXL4m1EiOS1OrX3sBqCjM7cuJcHViQjnbbyADuCgs:rk2E1kEi1asBqCM7QiQjbFuO

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Emotet family

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks