General

  • Target

    3bac94155c98ae5268ff0eb685a2a7bdf559eac677570a60b3fc5fc64a041e68N.exe

  • Size

    448KB

  • Sample

    250205-wa6t5sxkcv

  • MD5

    049123f296c1a5706c968e8e0c3c94d0

  • SHA1

    8b50ce6ddc0a171a2baeaa72e805791952acd8f1

  • SHA256

    3bac94155c98ae5268ff0eb685a2a7bdf559eac677570a60b3fc5fc64a041e68

  • SHA512

    385e0f20cd5c51dbb6edd2461e4561d783bec5c15b9b31f53c81affca6b822d7eb1b289c6d3cdf69b3c197603148a2dc005897552de57ab8bdb53f352686e50c

  • SSDEEP

    12288:xfzaBuiszJbE9mO4sl9kVlAOyQkNvOzxo0:xbMmO4sl9sR2Ot/

Malware Config

Extracted

Family

emotet

Botnet

Epoch1

C2

174.100.27.229:80

209.126.6.222:8080

5.153.250.14:8080

192.241.146.84:8080

95.9.180.128:80

77.55.211.77:8080

85.105.140.135:443

45.33.77.42:8080

77.90.136.129:8080

94.176.234.118:443

190.163.31.26:80

190.6.193.152:8080

190.181.235.46:80

81.198.69.61:80

188.2.217.94:80

114.109.179.60:80

83.169.21.32:7080

137.74.106.111:7080

212.231.60.98:80

170.81.48.2:80

rsa_pubkey.plain

Targets

    • Target

      3bac94155c98ae5268ff0eb685a2a7bdf559eac677570a60b3fc5fc64a041e68N.exe

    • Size

      448KB

    • MD5

      049123f296c1a5706c968e8e0c3c94d0

    • SHA1

      8b50ce6ddc0a171a2baeaa72e805791952acd8f1

    • SHA256

      3bac94155c98ae5268ff0eb685a2a7bdf559eac677570a60b3fc5fc64a041e68

    • SHA512

      385e0f20cd5c51dbb6edd2461e4561d783bec5c15b9b31f53c81affca6b822d7eb1b289c6d3cdf69b3c197603148a2dc005897552de57ab8bdb53f352686e50c

    • SSDEEP

      12288:xfzaBuiszJbE9mO4sl9kVlAOyQkNvOzxo0:xbMmO4sl9sR2Ot/

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Emotet family

    • Emotet payload

      Detects Emotet payload in memory.

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks