General

  • Target

    FILE-2020.doc

  • Size

    175KB

  • Sample

    200731-fpslvnlvga

  • MD5

    56ab9ac3130bd66459fda70446ffa3e6

  • SHA1

    ea46947eb8b33a8e135bc8e171027dee5800d5b2

  • SHA256

    a3067b8e4a9a978df100c40ffc83927994928d08bd48b59b55789e1626a67e7e

  • SHA512

    dafa8be16543a0cb8811652646df1a4bf943c437de03619b76d4ac3d3c573aa1e1b19eeb50be950b07f05d53881b51c7b82206aa815f07cc51dfc9731cdd3f7c

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://rikotut.net/rikotut4/vka_spx_tlz/

exe.dropper

http://ronnietucker.co.uk/fcm-dl/94_xeb_m7rfe9yj/

exe.dropper

http://rivcon.net/images/ze1_r8_3jdpf63/

exe.dropper

http://rollingturtle.com/music/isef_vmr_p/

exe.dropper

http://ronsonpainting.com/photogallery/7_26kr_ngbv3sha/

Extracted

Family

emotet

Botnet

Epoch2

C2

47.146.117.214:80

62.108.54.22:8080

212.51.142.238:8080

190.160.53.126:80

87.106.136.232:8080

74.208.45.104:8080

121.124.124.40:7080

124.45.106.173:443

76.27.179.47:80

210.165.156.91:80

61.19.246.238:443

81.2.235.111:8080

169.239.182.217:8080

181.230.116.163:80

139.130.242.43:80

46.105.131.87:80

139.59.60.244:8080

222.214.218.37:4143

41.60.200.34:80

200.55.243.138:8080

rsa_pubkey.plain

Targets

    • Target

      FILE-2020.doc

    • Size

      175KB

    • MD5

      56ab9ac3130bd66459fda70446ffa3e6

    • SHA1

      ea46947eb8b33a8e135bc8e171027dee5800d5b2

    • SHA256

      a3067b8e4a9a978df100c40ffc83927994928d08bd48b59b55789e1626a67e7e

    • SHA512

      dafa8be16543a0cb8811652646df1a4bf943c437de03619b76d4ac3d3c573aa1e1b19eeb50be950b07f05d53881b51c7b82206aa815f07cc51dfc9731cdd3f7c

    Score
    10/10
    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Emotet Payload

      Detects Emotet payload in memory.

    • Blacklisted process makes network request

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks