General

  • Target

    cb79f5d7b9b595abe2021e17a2891bb31e71838654cf1fb982f017b8072355de.doc

  • Size

    237KB

  • Sample

    200219-y8k3hyz222

  • MD5

    83486e87c6820fee0477a2b4c28819aa

  • SHA1

    92beaaaa2228fff3a7b44b1be663edc51b523c27

  • SHA256

    cb79f5d7b9b595abe2021e17a2891bb31e71838654cf1fb982f017b8072355de

  • SHA512

    a2d96acca3e30a9748cdfceb0a4c79c7bd16705175d0aea984dfd98ab8a9d1982ca730549856332b799b6308038029b5d8d9040668640de87a6f2cbc7fde8bd8

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://ta-behesht.ir/images/Provx00a/

exe.dropper

http://tatcogroup.ir/wp-admin/UC/

exe.dropper

http://tcpartner.ru/wp-includes/nr8/

exe.dropper

http://tepcian.utcc.ac.th/wp-admin/SquR/

exe.dropper

http://ourproductreview.in/pokjbg746ihrtr/a1kzwc/

Extracted

Family

emotet

Botnet

Epoch2

C2

71.126.247.90:80

98.239.119.52:80

80.86.91.91:8080

104.236.28.47:8080

47.155.214.239:443

180.92.239.110:8080

87.106.136.232:8080

76.104.80.47:80

173.16.62.227:80

92.222.216.44:8080

47.153.183.211:80

74.130.83.133:80

47.156.70.145:80

110.36.217.66:8080

160.16.215.66:8080

200.116.145.225:443

181.13.24.82:80

24.94.237.248:80

5.32.55.214:80

31.172.240.91:8080

rsa_pubkey.plain

Targets

    • Target

      cb79f5d7b9b595abe2021e17a2891bb31e71838654cf1fb982f017b8072355de.doc

    • Size

      237KB

    • MD5

      83486e87c6820fee0477a2b4c28819aa

    • SHA1

      92beaaaa2228fff3a7b44b1be663edc51b523c27

    • SHA256

      cb79f5d7b9b595abe2021e17a2891bb31e71838654cf1fb982f017b8072355de

    • SHA512

      a2d96acca3e30a9748cdfceb0a4c79c7bd16705175d0aea984dfd98ab8a9d1982ca730549856332b799b6308038029b5d8d9040668640de87a6f2cbc7fde8bd8

    Score
    10/10
    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blacklisted process makes network request

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Matrix

Tasks