Analysis

  • max time kernel
    107s
  • max time network
    116s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08/01/2025, 22:18 UTC

General

  • Target

    bd9b05a975ce0135a2fdfe79eef1074abf85ef781a3f4ef2176d6c5742673331N.exe

  • Size

    388KB

  • MD5

    85c5de1361061fb4d6662e064eb7dbe0

  • SHA1

    57b8435ba00e1f7a780451c76d4dd3949c55502c

  • SHA256

    bd9b05a975ce0135a2fdfe79eef1074abf85ef781a3f4ef2176d6c5742673331

  • SHA512

    157cd05b79cd669716166d38e3cee54c88678b51e20ed3888f393a6650e10c0f09a50666a9ae4909dbf040684d26d0f628a4b19322a8aa54b6b8127b78b85c5e

  • SSDEEP

    6144:24m/apJdyV8fDpc2SAGGwGGGGi/cNmGzc3A64fezqAbGR:a/aPd3sU3z44nbGR

Malware Config

Extracted

Family

emotet

Botnet

Epoch3

C2

66.61.94.36:80

159.203.232.29:8080

185.86.148.68:443

74.208.173.91:8080

37.70.131.107:80

212.156.133.218:80

81.17.93.134:80

203.153.216.182:7080

115.79.195.246:80

115.165.3.213:80

216.75.37.196:8080

81.214.253.80:443

192.241.220.183:8080

172.96.190.154:8080

195.201.56.70:8080

105.213.67.88:80

50.116.78.109:8080

188.166.25.84:8080

187.64.128.197:80

198.57.203.63:8080

rsa_pubkey.plain
1
-----BEGIN PUBLIC KEY-----
2
MHwwDQYJKoZIhvcNAQEBBQADawAwaAJhAM/TXLLvX91I6dVMYe+T1PPO6mpcg7OJ
3
cMl9o/g4nUhZOp8fAAmQl8XMXeGvDhZXTyX1AXf401iPFui0RB6glhl/7/djvi7j
4
l32lAhyBANpKGty8xf3J5kGwwClnG/CXHQIDAQAB
5
-----END PUBLIC KEY-----

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Emotet family
  • Emotet payload 3 IoCs

    Detects Emotet payload in memory.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd9b05a975ce0135a2fdfe79eef1074abf85ef781a3f4ef2176d6c5742673331N.exe
    "C:\Users\Admin\AppData\Local\Temp\bd9b05a975ce0135a2fdfe79eef1074abf85ef781a3f4ef2176d6c5742673331N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:3044

Network

    No results found
  • 66.61.94.36:80
    bd9b05a975ce0135a2fdfe79eef1074abf85ef781a3f4ef2176d6c5742673331N.exe
    152 B
    3
  • 66.61.94.36:80
    bd9b05a975ce0135a2fdfe79eef1074abf85ef781a3f4ef2176d6c5742673331N.exe
    152 B
    3
  • 159.203.232.29:8080
    bd9b05a975ce0135a2fdfe79eef1074abf85ef781a3f4ef2176d6c5742673331N.exe
    152 B
    3
  • 159.203.232.29:8080
    bd9b05a975ce0135a2fdfe79eef1074abf85ef781a3f4ef2176d6c5742673331N.exe
    152 B
    3
  • 185.86.148.68:443
    bd9b05a975ce0135a2fdfe79eef1074abf85ef781a3f4ef2176d6c5742673331N.exe
    152 B
    3
No results found

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3044-0-0x0000000000370000-0x000000000037C000-memory.dmp

    Filesize

    48KB

  • memory/3044-1-0x00000000002D0000-0x00000000002D9000-memory.dmp

    Filesize

    36KB

  • memory/3044-5-0x0000000000370000-0x000000000037C000-memory.dmp

    Filesize

    48KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.