General

  • Target

    a7a3ccc038f71fffe3ec163594f671c8_JaffaCakes118

  • Size

    667KB

  • Sample

    240614-cceznavcpn

  • MD5

    a7a3ccc038f71fffe3ec163594f671c8

  • SHA1

    abc01f0b80a22c29add72c3e9f723d2f60fcfa7d

  • SHA256

    7b7714da1ef3eae9ecf947c73df9b686fc504ae8a71b1cacbd324dd7263ce96a

  • SHA512

    23a2c75c788dc607ecca8192618e155818c348a94d9cf056a1ccfd245068fbbb31f22427cb533fe1e8b838c1447f22237570be9d079bcae013c645aa3ed5b6cc

  • SSDEEP

    12288:6+JJG//twCZ1CFy6jpcFnRO6QuiCDuBMoCJazA:6+J6/twC1N6jiVk6Quix4R

Malware Config

Extracted

Family

emotet

Botnet

Epoch2

C2

104.193.103.61:80

104.131.123.136:443

5.196.108.189:8080

121.124.124.40:7080

87.106.139.101:8080

213.196.135.145:80

50.35.17.13:80

38.18.235.242:80

24.43.32.186:80

82.80.155.43:80

103.86.49.11:8080

113.61.66.94:80

24.137.76.62:80

187.49.206.134:80

42.200.107.142:80

24.179.13.119:80

93.147.212.206:80

108.46.29.236:80

105.186.233.33:80

37.139.21.175:8080

rsa_pubkey.plain

Targets

    • Target

      a7a3ccc038f71fffe3ec163594f671c8_JaffaCakes118

    • Size

      667KB

    • MD5

      a7a3ccc038f71fffe3ec163594f671c8

    • SHA1

      abc01f0b80a22c29add72c3e9f723d2f60fcfa7d

    • SHA256

      7b7714da1ef3eae9ecf947c73df9b686fc504ae8a71b1cacbd324dd7263ce96a

    • SHA512

      23a2c75c788dc607ecca8192618e155818c348a94d9cf056a1ccfd245068fbbb31f22427cb533fe1e8b838c1447f22237570be9d079bcae013c645aa3ed5b6cc

    • SSDEEP

      12288:6+JJG//twCZ1CFy6jpcFnRO6QuiCDuBMoCJazA:6+J6/twC1N6jiVk6Quix4R

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Emotet payload

      Detects Emotet payload in memory.

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Tasks