General

  • Target

    JaffaCakes118_7a2a02bb9b3690ebe9f89d845c510075854f69cbc02608db416305e9e48b524f

  • Size

    4.6MB

  • Sample

    241229-lekglayjht

  • MD5

    8f1f79d8fb3ea1e85a3c25c8b6031995

  • SHA1

    c41e15b7c4e1bfad34642064a853ace62343dfce

  • SHA256

    7a2a02bb9b3690ebe9f89d845c510075854f69cbc02608db416305e9e48b524f

  • SHA512

    7056a05e82ad2989d840a8f8f0d187eaa6ee1a9ed9b34adc943cdbbc66a3d45ee2f606fb06a614ca48744a80a1ed9be45abe8fd201f76d3141ea41b49b96a8a1

  • SSDEEP

    98304:cTdlth73Qs3aiNH3TeogglChvg//Ta1P+de48GKocWLwDFRZhdWhw3qHa:cTjt4iNjFChg//Tkg8PSMvZrWq3q6

Malware Config

Extracted

Family

emotet

Botnet

Epoch2

C2

184.180.181.202:80

169.50.76.149:8080

162.241.140.129:8080

104.131.123.136:443

194.187.133.160:443

71.15.245.148:8080

37.139.21.175:8080

104.131.11.150:443

118.83.154.64:443

24.137.76.62:80

79.137.83.50:443

69.206.132.149:80

110.142.236.207:80

123.176.25.234:80

120.150.60.189:80

209.54.13.14:80

95.213.236.64:8080

209.141.54.221:8080

96.245.227.43:80

87.106.139.101:8080

rsa_pubkey.plain

Extracted

Family

emotet

Botnet

Epoch1

C2

190.96.15.50:80

192.175.111.214:8080

95.85.33.23:8080

192.232.229.54:7080

200.127.14.97:80

190.188.245.242:80

51.15.7.145:80

138.97.60.140:8080

98.13.75.196:80

213.52.74.198:80

74.58.215.226:80

192.81.38.31:80

191.182.6.118:80

212.71.237.140:8080

209.236.123.42:8080

60.93.23.51:80

178.211.45.66:8080

190.24.243.186:80

62.84.75.50:80

50.121.220.50:80

rsa_pubkey.plain

Extracted

Family

emotet

Botnet

Epoch3

C2

73.100.19.104:80

103.3.63.137:8080

188.166.220.180:7080

192.175.111.217:7080

91.83.93.103:443

94.212.52.40:80

190.191.171.72:80

24.231.51.190:80

113.161.148.81:80

46.105.131.68:8080

223.17.215.76:80

45.239.204.100:80

185.80.172.199:80

91.75.75.46:80

190.151.5.131:443

60.125.114.64:443

77.74.78.80:443

175.103.38.146:80

58.27.215.3:8080

91.213.106.100:8080

rsa_pubkey.plain

Targets

    • Target

      0937008bee11c456fb93fe4b92a0238a.exe

    • Size

      314KB

    • MD5

      0937008bee11c456fb93fe4b92a0238a

    • SHA1

      4c1a53ff8046082e20e8d1647c68f7804665f79e

    • SHA256

      03271aebd1636e9efafe251ab0325cde0e0f942e50168e4a1f090c46fbe47522

    • SHA512

      1fbd28b4fc0487147e1f2d6866bc310d82d320dbbcf29168649df56079bf97da9c745c44d0d795601e567aaa0aca86ae7f35641e3c357a83371f6e74b5a1c48f

    • SSDEEP

      6144:pTbWxHo9/nKS39i1089F48+RkznTGEPVwe6cj6kHq5wSRX0:pPnKSYF9F4oTD7Rj5Hq5wuX

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Emotet family

    • Emotet payload

      Detects Emotet payload in memory.

    • Dave packer

      Detects executable using a packer named 'Dave' by the community, based on a string at the end.

    • Executes dropped EXE

    • Drops file in System32 directory

    • Target

      187bc75717e926ed0a3380753fec6720.exe

    • Size

      314KB

    • MD5

      187bc75717e926ed0a3380753fec6720

    • SHA1

      0435d2375857e7717a0dddd0232fcbe0b750cadb

    • SHA256

      8779b695d6c6a56f42f9a01484c200f86251b3198823527cb72b0d3d78327a1d

    • SHA512

      0e2db9deb775c411b099744dd4ebf79b4e86d2a98ba0d33503feadc04e9a1c96fe37c8cf7f171b4233fafce4bac3881dc0bf1910279ea0ea919df5f7ae3ffb60

    • SSDEEP

      6144:pTbWxHo9/nKS39i1089F48jRkznTGEPVwe6cj6kHq5wSRX0:pPnKSYF9F41TD7Rj5Hq5wuX

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Emotet family

    • Emotet payload

      Detects Emotet payload in memory.

    • Dave packer

      Detects executable using a packer named 'Dave' by the community, based on a string at the end.

    • Executes dropped EXE

    • Drops file in System32 directory

    • Target

      1b2f450382b4912c953ee26465fd8c4b.exe

    • Size

      544KB

    • MD5

      1b2f450382b4912c953ee26465fd8c4b

    • SHA1

      b906d75b852f6fbd2fddf8bc5b2ce04692bb154d

    • SHA256

      434848211b348256629cafc47e11888030b82906713d6c10e75331001d0f9ce2

    • SHA512

      cc3139d5886d75abc6debe330325f884943fd84668ff99d875a4607851b45f015a8b2fb6ec70969401a3aced4056f7e65ecaf6bc5da2816421db9ad594c8fcc0

    • SSDEEP

      12288:NWU9176sQVZE+RjyHBLcmacsitPbD5bZ4zc:N/tQzE+ROH5vft

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Emotet family

    • Emotet payload

      Detects Emotet payload in memory.

    • Dave packer

      Detects executable using a packer named 'Dave' by the community, based on a string at the end.

    • Executes dropped EXE

    • Drops file in System32 directory

    • Target

      1f2be8e532057d96720885395b60a08f.exe

    • Size

      544KB

    • MD5

      1f2be8e532057d96720885395b60a08f

    • SHA1

      965b6ef75669dee3e21b7a82435154e2298485f1

    • SHA256

      c8179d145546240cf5563aacfc7af3fa463a8506cf686607f08d3c63e4958013

    • SHA512

      02ae19aa0ddca726bcbb3aa1e009a4a5f445997b51c6a79e306ed08008327c0209f15e19f7767f54e2d20430279a7e09ec574a73ae566937b851200dcdfa9977

    • SSDEEP

      12288:NWU9176GQVZE+RjyHBLcmacsitPbD5bZ4zc:N/TQzE+ROH5vft

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Emotet family

    • Emotet payload

      Detects Emotet payload in memory.

    • Dave packer

      Detects executable using a packer named 'Dave' by the community, based on a string at the end.

    • Executes dropped EXE

    • Drops file in System32 directory

    • Target

      2bc810b244cbe0d6b9511907f1a688ee.exe

    • Size

      339KB

    • MD5

      2bc810b244cbe0d6b9511907f1a688ee

    • SHA1

      3ec9d02dd26354c1b06ad0fad5682a97438f0437

    • SHA256

      1da71f037004d926716332d9835e29e586b383f90ae9cd83217d8312229a3dcb

    • SHA512

      920f972e92552ce74e2e686bf640cd76d4b5fd5c452d6bc66a2c488d487611743f0679dcaf3bd9c268cee9792409e58f36d7f517937a68b76e17cfb03c7e97fa

    • SSDEEP

      6144:6nrRBHo9fqy39CN0tavtrvUh6zS/VvPDIWE3F3HY0:6wqy46anzKV3DIB3F3HY

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Emotet family

    • Emotet payload

      Detects Emotet payload in memory.

    • Dave packer

      Detects executable using a packer named 'Dave' by the community, based on a string at the end.

    • Executes dropped EXE

    • Drops file in System32 directory

    • Target

      2bdca358c2bcf8b3f4f54b34dd5a0723.exe

    • Size

      544KB

    • MD5

      2bdca358c2bcf8b3f4f54b34dd5a0723

    • SHA1

      130728ef0f53f423f93eed40cf310100b48c83a6

    • SHA256

      20359c76d87189bd039f7c5cb39c84d569ff273e32d79fce49e5be70a4fe1965

    • SHA512

      cf1ed2b03c26c23949df4ef13ce133373bf67252c9d85d8d1743a07d0ffa47e2b40193d79fdfb3444e3e3bec297daafc02149b24d7257efc89de2ec7f230f09f

    • SSDEEP

      12288:NWU9176dQVZE+RjyHBLcmacsitPbD5bZ4zc:N/kQzE+ROH5vft

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Emotet family

    • Emotet payload

      Detects Emotet payload in memory.

    • Dave packer

      Detects executable using a packer named 'Dave' by the community, based on a string at the end.

    • Executes dropped EXE

    • Drops file in System32 directory

    • Target

      3eefc2ad6943e95f0307b50c37bb9970.exe

    • Size

      333KB

    • MD5

      3eefc2ad6943e95f0307b50c37bb9970

    • SHA1

      534d79e07797f1c6eacd4bebec287ceccd2d09bc

    • SHA256

      03c76de2973cf5ad9a2141e7426dfe0590771833c92de9435643ec95010e2db2

    • SHA512

      09588fcb2f77570c7fd4c0073b9804856a4729f46b960325a34ac529da6be52e64d577be7ad45d6feadc563210344fcc5ec34e410ed04028061730ff358d6ac1

    • SSDEEP

      6144:bSbWOHo9/nKS39iF089F4kSak52gTwNzO3FRluiJO9JAz0:bNnKSYV9F4NTwBO1R0sOHK

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Emotet family

    • Emotet payload

      Detects Emotet payload in memory.

    • Dave packer

      Detects executable using a packer named 'Dave' by the community, based on a string at the end.

    • Executes dropped EXE

    • Drops file in System32 directory

    • Target

      4a833f5dafe4b384b3f207f7c933950a.exe

    • Size

      333KB

    • MD5

      4a833f5dafe4b384b3f207f7c933950a

    • SHA1

      7726af44a320ccd7d63405948b443c08e53ff028

    • SHA256

      88c4555c52666bf2f6d274510885c3aa486fc3311b8b867038436aa3a0a364a5

    • SHA512

      c4f02d83418755061ad660ad77c10bbac55261e5fdb96728f686bd976c28b92d884e295cb36821b29c9ba6ddf8b1a97ebb72db463059face770e887c97a63ef7

    • SSDEEP

      6144:bSbWOHo9/nKS39iF089F4kfak52gTwNzO3FRluiJO9JAz0:bNnKSYV9F4KTwBO1R0sOHK

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Emotet family

    • Emotet payload

      Detects Emotet payload in memory.

    • Dave packer

      Detects executable using a packer named 'Dave' by the community, based on a string at the end.

    • Executes dropped EXE

    • Drops file in System32 directory

    • Target

      55149db482552fee3ab1d44f416d4dee.exe

    • Size

      314KB

    • MD5

      55149db482552fee3ab1d44f416d4dee

    • SHA1

      c3d66749cf5020ed55e8cf458de118caf4a953db

    • SHA256

      ce8aee2708c3c98a56771ea2306f287dfc9311af53ef242d9e6d3343f9d36a15

    • SHA512

      dbb46a497b3e8db02ece548d72ec4242e153a82edbf01ea016428c9362568bb902e75a339e0b42a6e7c67f7d5d09be80d9da056976f1b0f78f5d07ce93c00b0e

    • SSDEEP

      6144:pTbWxHo9/nKS39i1089F48XRkznTGEPVwe6cj6kHq5wSRX0:pPnKSYF9F4dTD7Rj5Hq5wuX

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Emotet family

    • Emotet payload

      Detects Emotet payload in memory.

    • Dave packer

      Detects executable using a packer named 'Dave' by the community, based on a string at the end.

    • Executes dropped EXE

    • Drops file in System32 directory

    • Target

      579ec4d80e57f949e26ecb34f25fc9ca.exe

    • Size

      339KB

    • MD5

      579ec4d80e57f949e26ecb34f25fc9ca

    • SHA1

      73cc1f29875033acd762e5784a2ff3c25ee55f59

    • SHA256

      1fe3456a39ca75cd9f563a489830584709e2cd63d35c7444d9dfbbbd2cfb976d

    • SHA512

      2e7e5d1174457167250f76ae3ef2d5b0485918b8c11700c63501c17e45daff08f19f49851f25501318c417058872a130fa687ab41fbfed92044624093bfa54f6

    • SSDEEP

      6144:6nrRBHo9fqy39CN0tavtkvUh6zS/VvPDIWE3F3HY0:6wqy46aOzKV3DIB3F3HY

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Emotet family

    • Emotet payload

      Detects Emotet payload in memory.

    • Dave packer

      Detects executable using a packer named 'Dave' by the community, based on a string at the end.

    • Executes dropped EXE

    • Drops file in System32 directory

    • Target

      652d0ea3d43ee4c6fb7f65e1e757e2b5.exe

    • Size

      339KB

    • MD5

      652d0ea3d43ee4c6fb7f65e1e757e2b5

    • SHA1

      55ea15cdcf721750582060155e613aeebf43f1eb

    • SHA256

      25aba3ca6fa578be93b2c34a2b85457390bbddc901de49001aaf2fabd68fbfed

    • SHA512

      12c39120f022204f060595c2498eed3e293b8c56b20decbbd7440d03ff4b86ad3e93e4bf9b96dbc4d2e4dd04b387db232551f6cced4f20cb5a9c88390a5b99b6

    • SSDEEP

      6144:6nrRBHo9fqy39CN0tavtFvUh6zS/VvPDIWE3F3HY0:6wqy46aRzKV3DIB3F3HY

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Emotet family

    • Emotet payload

      Detects Emotet payload in memory.

    • Dave packer

      Detects executable using a packer named 'Dave' by the community, based on a string at the end.

    • Executes dropped EXE

    • Drops file in System32 directory

    • Target

      663645874e84c0d8293a0fd5147ca172.exe

    • Size

      339KB

    • MD5

      663645874e84c0d8293a0fd5147ca172

    • SHA1

      9c1d8f470d13e8f93974a676188afde8af5c5253

    • SHA256

      9f9acee1aa71506dc5625a76a775b6dcd25e8afa299f1df6f8083b060ac5b75a

    • SHA512

      c4a76c18bacdb7bf4bb790425f368d060a016d28cc72ac018eab988dac4ea170dc1dd3e1bbe53bf7b97488548fbec2804b8ad4fc7eae6c90f3ca98184f1dfe68

    • SSDEEP

      6144:6nrRBHo9fqy39CN0tavtevUh6zS/VvPDIWE3F3HY0:6wqy46a4zKV3DIB3F3HY

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Emotet family

    • Emotet payload

      Detects Emotet payload in memory.

    • Dave packer

      Detects executable using a packer named 'Dave' by the community, based on a string at the end.

    • Executes dropped EXE

    • Drops file in System32 directory

    • Target

      687e10aa4a6b00c729f884e8846a6cc1.exe

    • Size

      333KB

    • MD5

      687e10aa4a6b00c729f884e8846a6cc1

    • SHA1

      1f4c85ef2af83884fe3b806303d0ff30bda90e4a

    • SHA256

      04ab7d07f8eb692d5f7569be82fab091c455fe775c42e8f41c2b3bf1ae266588

    • SHA512

      3aae6d9a25f0142fbb03266ad5b8d90779df1b6b2d13205bb2f9f81e99e7abcaa311f1be944469ffe4b07ef508c4319fbc6397c9c67f2479ba5a537b987d03f7

    • SSDEEP

      6144:bSbWOHo9/nKS39iF089F4kMak52gTwNzO3FRluiJO9JAz0:bNnKSYV9F4fTwBO1R0sOHK

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Emotet family

    • Emotet payload

      Detects Emotet payload in memory.

    • Dave packer

      Detects executable using a packer named 'Dave' by the community, based on a string at the end.

    • Executes dropped EXE

    • Drops file in System32 directory

    • Target

      71a0fca12f9b04118050ab4d92e58a9e.exe

    • Size

      333KB

    • MD5

      71a0fca12f9b04118050ab4d92e58a9e

    • SHA1

      aa3a67f69b6214e98fbbcaba1e4b0fe815fd2ce5

    • SHA256

      0e9388f060003481acb1173c8f6f19e5092ef731259654bcda6d48b291a863aa

    • SHA512

      13b1676ce28fe7353ef8110ed5f502615762dd08f3d610c2323e701a3c7cd11b4c30ad71106728e387e249ab47f10fd2da367331f01dd3ca50b6cdeaada63878

    • SSDEEP

      6144:bSbWOHo9/nKS39iF089F4kPak52gTwNzO3FRluiJO9JAz0:bNnKSYV9F4WTwBO1R0sOHK

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Emotet family

    • Emotet payload

      Detects Emotet payload in memory.

    • Dave packer

      Detects executable using a packer named 'Dave' by the community, based on a string at the end.

    • Executes dropped EXE

    • Drops file in System32 directory

    • Target

      7834499149add19c6c3507d0f2f31319.exe

    • Size

      457KB

    • MD5

      7834499149add19c6c3507d0f2f31319

    • SHA1

      3f7eba783edef4988692355e4c7f617a34fa59d4

    • SHA256

      ea7191957590892433a40deb9421352a5dda21500e611eff8f810c71ebd2942a

    • SHA512

      740fecdd3c684f3199f4923d47d67db3188434591d8ece39a18ae65a160ce4f5d7fd3d8f88b29aff795e9312d95eb05da8391340cfd109b05d26d071c18e6f81

    • SSDEEP

      12288:QCeRhmZzvnDrcmacsitPbD5bZy6dFDHvTzT29cq:dFvXvfumVLP29cq

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Emotet family

    • Emotet payload

      Detects Emotet payload in memory.

    • Dave packer

      Detects executable using a packer named 'Dave' by the community, based on a string at the end.

    • Executes dropped EXE

    • Drops file in System32 directory

    • Target

      923cd10ee8d4aaaf7f366fcc17c89078.exe

    • Size

      333KB

    • MD5

      923cd10ee8d4aaaf7f366fcc17c89078

    • SHA1

      26e829339420ca0b451cd7761be04548110fc4af

    • SHA256

      c7842851ff10b7587b93a3a1540878cb7f669eee0e28f7258cbff22427aaa17c

    • SHA512

      de4cf3c38b48fcd643db33de7f99a457b40848ee9a3316bdaef632d7a49b9b574ec9cd9afc7744dafa360e59c4b48e2b7f72923978440900b6400e964046545f

    • SSDEEP

      6144:bSbWOHo9/nKS39iF089F4knak52gTwNzO3FRluiJO9JAz0:bNnKSYV9F46TwBO1R0sOHK

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Emotet family

    • Emotet payload

      Detects Emotet payload in memory.

    • Dave packer

      Detects executable using a packer named 'Dave' by the community, based on a string at the end.

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks

static1

Score
3/10

behavioral1

emotetepoch2bankerdavediscoverytrojan
Score
10/10

behavioral2

emotetepoch2bankerdavediscoverytrojan
Score
10/10

behavioral3

emotetepoch2bankerdavediscoverytrojan
Score
10/10

behavioral4

emotetepoch2bankerdavediscoverytrojan
Score
10/10

behavioral5

emotetepoch2bankerdavediscoverytrojan
Score
10/10

behavioral6

emotetepoch2bankerdavediscoverytrojan
Score
10/10

behavioral7

emotetepoch2bankerdavediscoverytrojan
Score
10/10

behavioral8

emotetepoch2bankerdavediscoverytrojan
Score
10/10

behavioral9

emotetepoch1bankerdavediscoverytrojan
Score
10/10

behavioral10

emotetepoch1bankerdavediscoverytrojan
Score
10/10

behavioral11

emotetepoch2bankerdavediscoverytrojan
Score
10/10

behavioral12

emotetepoch2bankerdavediscoverytrojan
Score
10/10

behavioral13

emotetepoch3bankerdavediscoverytrojan
Score
10/10

behavioral14

emotetepoch3bankerdavediscoverytrojan
Score
10/10

behavioral15

emotetepoch3bankerdavediscoverytrojan
Score
10/10

behavioral16

emotetepoch3bankerdavediscoverytrojan
Score
10/10

behavioral17

emotetepoch2bankerdavediscoverytrojan
Score
10/10

behavioral18

emotetepoch2bankerdavediscoverytrojan
Score
10/10

behavioral19

emotetepoch1bankerdavediscoverytrojan
Score
10/10

behavioral20

emotetepoch1bankerdavediscoverytrojan
Score
10/10

behavioral21

emotetepoch1bankerdavediscoverytrojan
Score
10/10

behavioral22

emotetepoch1bankerdavediscoverytrojan
Score
10/10

behavioral23

emotetepoch1bankerdavediscoverytrojan
Score
10/10

behavioral24

emotetepoch1bankerdavediscoverytrojan
Score
10/10

behavioral25

emotetepoch3bankerdavediscoverytrojan
Score
10/10

behavioral26

emotetepoch3bankerdavediscoverytrojan
Score
10/10

behavioral27

emotetepoch3bankerdavediscoverytrojan
Score
10/10

behavioral28

emotetepoch3bankerdavediscoverytrojan
Score
10/10

behavioral29

emotetepoch1bankerdavediscoverytrojan
Score
10/10

behavioral30

emotetepoch1bankerdavediscoverytrojan
Score
10/10

behavioral31

emotetepoch3bankerdavediscoverytrojan
Score
10/10

behavioral32

emotetepoch3bankerdavediscoverytrojan
Score
10/10