General

  • Target

    029f76bc84bfdefee9cf8c561ae69a7c982c22485d8007ebd09306520cdd002cN.exe

  • Size

    433KB

  • Sample

    241225-vrz79azlaw

  • MD5

    b508155486b3f2a7202c3c4cee343b80

  • SHA1

    8b633a364d47d508288b174ab53cd28f4a142444

  • SHA256

    029f76bc84bfdefee9cf8c561ae69a7c982c22485d8007ebd09306520cdd002c

  • SHA512

    dc672eee60e6439a3ee14a3be40f448dd65eac19efbf762a71265c3d463d5e05e607fe82fc2ff9fee1a5e9caed9daf5f54dcfd654ffe00a3b92a356c74aba068

  • SSDEEP

    12288:w3zKxZ14g1hxgsjtuEiiSFdgiAbj1qiua2KB3BSVyfYzP:a2Z1CEiTFJAbZqiBx4yKP

Malware Config

Extracted

Family

emotet

Botnet

Epoch3

C2

113.161.176.235:80

88.247.30.64:80

89.163.210.141:8080

139.162.10.249:8080

203.157.152.9:7080

109.99.146.210:8080

78.90.78.210:80

172.193.14.201:80

157.7.164.178:8081

189.211.214.19:443

157.245.145.87:443

180.148.4.130:8080

46.32.229.152:8080

24.245.65.66:80

82.78.179.117:443

177.130.51.198:80

121.117.147.153:443

203.160.167.243:80

172.104.46.84:8080

202.29.237.113:8080

rsa_pubkey.plain

Targets

    • Target

      029f76bc84bfdefee9cf8c561ae69a7c982c22485d8007ebd09306520cdd002cN.exe

    • Size

      433KB

    • MD5

      b508155486b3f2a7202c3c4cee343b80

    • SHA1

      8b633a364d47d508288b174ab53cd28f4a142444

    • SHA256

      029f76bc84bfdefee9cf8c561ae69a7c982c22485d8007ebd09306520cdd002c

    • SHA512

      dc672eee60e6439a3ee14a3be40f448dd65eac19efbf762a71265c3d463d5e05e607fe82fc2ff9fee1a5e9caed9daf5f54dcfd654ffe00a3b92a356c74aba068

    • SSDEEP

      12288:w3zKxZ14g1hxgsjtuEiiSFdgiAbj1qiua2KB3BSVyfYzP:a2Z1CEiTFJAbZqiBx4yKP

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Emotet family

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks