General

  • Target

    2025-02-27_fc30ec71b2fd21590f76a2bed1384c96_icedid_ramnit

  • Size

    435KB

  • Sample

    250227-jaygjszybt

  • MD5

    fc30ec71b2fd21590f76a2bed1384c96

  • SHA1

    e3cc47fae54161eccf48aaaf95817ce007051113

  • SHA256

    02a508a6ff8c53a9b4f43420ef555b84e843eec59c126aa603ee8795e0d85906

  • SHA512

    32f59eb090475e12184b9967694b4fb5d8dcb2e7db8532c2deaf50597ec44a3d6bb1f7e7aa18be6afe6e6f4c806b778ab69c8e22c610930aa1caa9f276599054

  • SSDEEP

    12288:dRX3wK9rybO3AlLBeTWi+eO6e2ZwgL7OG+pG/YD:dRX3wK9ruO3Alpi+eO6e2ZwBgYD

Malware Config

Extracted

Family

emotet

Botnet

Epoch3

C2

41.169.20.147:8090

72.10.33.195:8080

177.0.241.28:80

82.165.15.188:8080

190.111.215.4:8080

46.49.124.53:80

190.63.7.166:8080

45.118.136.92:8080

220.128.125.18:80

178.153.214.228:80

139.59.12.63:8080

163.172.107.70:8080

190.251.235.239:80

46.32.229.152:8080

78.188.170.128:80

110.44.113.2:8080

77.74.78.80:443

37.70.131.107:80

188.0.135.237:80

188.251.213.180:443

rsa_pubkey.plain

Targets

    • Target

      2025-02-27_fc30ec71b2fd21590f76a2bed1384c96_icedid_ramnit

    • Size

      435KB

    • MD5

      fc30ec71b2fd21590f76a2bed1384c96

    • SHA1

      e3cc47fae54161eccf48aaaf95817ce007051113

    • SHA256

      02a508a6ff8c53a9b4f43420ef555b84e843eec59c126aa603ee8795e0d85906

    • SHA512

      32f59eb090475e12184b9967694b4fb5d8dcb2e7db8532c2deaf50597ec44a3d6bb1f7e7aa18be6afe6e6f4c806b778ab69c8e22c610930aa1caa9f276599054

    • SSDEEP

      12288:dRX3wK9rybO3AlLBeTWi+eO6e2ZwgL7OG+pG/YD:dRX3wK9ruO3Alpi+eO6e2ZwBgYD

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Emotet family

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Ramnit family

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks