Resubmissions

25/02/2025, 09:21

250225-lbjqwsskx4 10

11/11/2024, 17:35

241111-v5y74ssfrb 10

General

  • Target

    a5e2d160e9475d528afef72de307fc49be97e89a2836402cdabf28f472509763

  • Size

    372KB

  • Sample

    250225-lbjqwsskx4

  • MD5

    e374cf9f9bc51d251feb7ac237976de6

  • SHA1

    1bfb1e0f277e1baa360a8d1ec2a1b8b68585e23a

  • SHA256

    a5e2d160e9475d528afef72de307fc49be97e89a2836402cdabf28f472509763

  • SHA512

    b1c3c7c29aa67b1a75a5f43ffa2c1372038a43e226fbd980171580a3bb7094ceedd8ff0cf98bf3073914381d6375abc9788bf3689e8c7cb6ecf5653e1a71b399

  • SSDEEP

    6144:5w6KjnnTFBAiDj+0fTkSGiurL1+scETSUR62KtjF:EtBRDj+0rkThWKbQF

Malware Config

Extracted

Family

emotet

Botnet

Epoch1

C2

201.171.150.41:443

94.76.247.61:8080

213.176.36.147:8080

190.181.235.46:80

181.36.42.205:443

83.169.21.32:7080

24.148.98.177:80

188.2.217.94:80

82.196.15.205:8080

145.236.8.174:80

73.116.193.136:80

178.79.163.131:8080

189.2.177.210:443

202.62.39.111:80

177.74.228.34:80

94.176.234.118:443

181.129.96.162:8080

186.103.141.250:443

191.99.160.58:80

111.67.12.221:8080

rsa_pubkey.plain

Targets

    • Target

      a5e2d160e9475d528afef72de307fc49be97e89a2836402cdabf28f472509763

    • Size

      372KB

    • MD5

      e374cf9f9bc51d251feb7ac237976de6

    • SHA1

      1bfb1e0f277e1baa360a8d1ec2a1b8b68585e23a

    • SHA256

      a5e2d160e9475d528afef72de307fc49be97e89a2836402cdabf28f472509763

    • SHA512

      b1c3c7c29aa67b1a75a5f43ffa2c1372038a43e226fbd980171580a3bb7094ceedd8ff0cf98bf3073914381d6375abc9788bf3689e8c7cb6ecf5653e1a71b399

    • SSDEEP

      6144:5w6KjnnTFBAiDj+0fTkSGiurL1+scETSUR62KtjF:EtBRDj+0rkThWKbQF

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Emotet family

    • Emotet payload

      Detects Emotet payload in memory.

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks