General

  • Target

    5e2aecf655b1e36d336f37e6b5c23f48620ac32f898f3ed1951e964f80f8c7e2

  • Size

    33KB

  • MD5

    53ee2c4df764dd4f08cd8145600e4e38

  • SHA1

    daa9f44262048c4a3825fedc6104ab50607610aa

  • SHA256

    5e2aecf655b1e36d336f37e6b5c23f48620ac32f898f3ed1951e964f80f8c7e2

  • SHA512

    5109c5b0f2b111d8f2a5ed71c11fe0a1e559da5a0290952cbe36365747d2801752243e55399d8494c9cb3b41e7d12c829d4a70034653162255b83ab720b67ea1

  • SSDEEP

    768:8mExUJ2MWb+E9kFBYXo577Zp3589dXJ1WdAcncuZLRU9L:pEcaWY477L4hWdAcncuZLRUx

Malware Config

Extracted

Family

emotet

Botnet

Epoch2

C2

109.117.53.230:443

212.51.142.238:8080

190.160.53.126:80

139.59.60.244:8080

91.211.88.52:7080

190.108.228.62:443

186.208.123.210:443

46.105.131.87:80

173.91.22.41:80

222.214.218.37:4143

31.31.77.83:443

62.75.141.82:80

93.156.165.186:80

93.51.50.171:8080

185.94.252.104:443

78.189.165.52:8080

95.179.229.244:8080

73.11.153.178:8080

203.153.216.189:7080

95.213.236.64:8080

rsa_pubkey.plain

Signatures

  • Emotet family
  • Emotet payload 1 IoCs

    Detects Emotet payload in memory.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5e2aecf655b1e36d336f37e6b5c23f48620ac32f898f3ed1951e964f80f8c7e2
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections