General

  • Target

    4a8933be620c2de8d5b3dfb72d0e94df68242c07874ed82fd285b8bee6744729

  • Size

    32KB

  • MD5

    47d129767b5b34c8a6b54ac5e929b74f

  • SHA1

    5ed0d6e1115e859b03b0a76c826e7670e55cce09

  • SHA256

    4a8933be620c2de8d5b3dfb72d0e94df68242c07874ed82fd285b8bee6744729

  • SHA512

    9a67c962d3a0ddce43d361d1c63ed7449d414fa24dc396e375b920934791d44a3d0fc1b8a96b7b5f6168c5336eb1fe09e24659e1451a260f4ed4f113e4f1f605

  • SSDEEP

    768:rYQeeKXXX/hrWSznUVhsYeYLoOgoyxDd0/A89ltnp41:rYQeeKTYhjeYLoOgoqy/A89bp6

Malware Config

Extracted

Family

emotet

Botnet

Epoch2

C2

76.27.179.47:80

212.51.142.238:8080

189.212.199.126:443

61.19.246.238:443

162.154.38.103:80

91.211.88.52:7080

83.110.223.58:443

124.45.106.173:443

116.203.32.252:8080

109.117.53.230:443

5.196.74.210:8080

75.139.38.211:80

168.235.67.138:7080

176.111.60.55:8080

169.239.182.217:8080

74.208.45.104:8080

31.31.77.83:443

222.214.218.37:4143

37.139.21.175:8080

91.205.215.66:443

rsa_pubkey.plain

Signatures

  • Emotet family
  • Emotet payload 1 IoCs

    Detects Emotet payload in memory.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4a8933be620c2de8d5b3dfb72d0e94df68242c07874ed82fd285b8bee6744729
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections