General

  • Target

    522e9d26d4ca76fe332b2bafd8e6c3c4e417cfad93f19d87254796ba9ccb995b.exe

  • Size

    448KB

  • Sample

    250205-e15akazkfy

  • MD5

    f3b46d72446848648e8a0bb78eb63fc5

  • SHA1

    8d1f9bcfdb60ee209e80e23c84e27447c5092241

  • SHA256

    522e9d26d4ca76fe332b2bafd8e6c3c4e417cfad93f19d87254796ba9ccb995b

  • SHA512

    d288d11bdf7c42ea61a6ad4fa2952f0d64a7cb6d236ffe8420b59c8bddca551e2fa74804e2433fe38daea2ea41921885a8e75c6471e64b6b6f6f6ddf5d493261

  • SSDEEP

    12288:xfzaBuiszJbE9mO4sl9kVlAOyQkNvOzxo0r:xbMmO4sl9sR2Ot/r

Malware Config

Extracted

Family

emotet

Botnet

Epoch1

C2

174.100.27.229:80

209.126.6.222:8080

5.153.250.14:8080

192.241.146.84:8080

95.9.180.128:80

77.55.211.77:8080

85.105.140.135:443

45.33.77.42:8080

77.90.136.129:8080

94.176.234.118:443

190.163.31.26:80

190.6.193.152:8080

190.181.235.46:80

81.198.69.61:80

188.2.217.94:80

114.109.179.60:80

83.169.21.32:7080

137.74.106.111:7080

212.231.60.98:80

170.81.48.2:80

rsa_pubkey.plain

Targets

    • Target

      522e9d26d4ca76fe332b2bafd8e6c3c4e417cfad93f19d87254796ba9ccb995b.exe

    • Size

      448KB

    • MD5

      f3b46d72446848648e8a0bb78eb63fc5

    • SHA1

      8d1f9bcfdb60ee209e80e23c84e27447c5092241

    • SHA256

      522e9d26d4ca76fe332b2bafd8e6c3c4e417cfad93f19d87254796ba9ccb995b

    • SHA512

      d288d11bdf7c42ea61a6ad4fa2952f0d64a7cb6d236ffe8420b59c8bddca551e2fa74804e2433fe38daea2ea41921885a8e75c6471e64b6b6f6f6ddf5d493261

    • SSDEEP

      12288:xfzaBuiszJbE9mO4sl9kVlAOyQkNvOzxo0r:xbMmO4sl9sR2Ot/r

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Emotet family

    • Emotet payload

      Detects Emotet payload in memory.

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks