Analysis

  • max time kernel
    129s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2024 22:29

General

  • Target

    530a5b5946055b3b7d8c17b0cd981eac0ac668d29c9b9ba798b8fbe55be498d2.exe

  • Size

    176KB

  • MD5

    298a4479ef17c99ad40e903f40710eac

  • SHA1

    680fd4fbea33342075a975e637679f8260a9e60e

  • SHA256

    530a5b5946055b3b7d8c17b0cd981eac0ac668d29c9b9ba798b8fbe55be498d2

  • SHA512

    fdf7d5bdcd1211b6823613851a00d8c0e1ceeee0b6b1d82cc0794790fbb30bb36cd2e6bcd87d6aa34b3695c13c7274939626f53349a0222aa94e4f0697fbad7f

  • SSDEEP

    3072:RxFrVZ8wIRbLlPldFpCXDC8uPF+qZqcLknKtntNf98JvpjQqDbfoF:RLr/8w2bLlNP8uPLxVtntNfWJvZQO

Malware Config

Extracted

Family

emotet

Botnet

Epoch3

C2

118.7.227.42:443

188.226.165.170:8080

188.40.170.197:80

51.38.50.144:8080

153.229.219.1:443

162.144.145.58:8080

126.126.139.26:443

85.246.78.192:80

177.130.51.198:80

42.200.96.63:80

73.55.128.120:80

113.203.238.130:80

202.29.237.113:8080

181.59.59.54:80

58.27.215.3:8080

60.108.128.186:80

190.192.39.136:80

185.63.32.149:80

50.116.78.109:8080

121.117.147.153:443

rsa_pubkey.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Emotet family
  • Emotet payload 3 IoCs

    Detects Emotet payload in memory.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\530a5b5946055b3b7d8c17b0cd981eac0ac668d29c9b9ba798b8fbe55be498d2.exe
    "C:\Users\Admin\AppData\Local\Temp\530a5b5946055b3b7d8c17b0cd981eac0ac668d29c9b9ba798b8fbe55be498d2.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:3148

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3148-5-0x00000000021E0000-0x00000000021F3000-memory.dmp

    Filesize

    76KB

  • memory/3148-1-0x00000000021C0000-0x00000000021D5000-memory.dmp

    Filesize

    84KB

  • memory/3148-0-0x00000000005D0000-0x00000000005E2000-memory.dmp

    Filesize

    72KB