General

  • Target

    a7a6c086f7e33519b09f6a7857e203ad_JaffaCakes118

  • Size

    667KB

  • Sample

    240614-cejqma1dpd

  • MD5

    a7a6c086f7e33519b09f6a7857e203ad

  • SHA1

    2c71ce41526d4231108eafd7b303f3ac8c6a01fa

  • SHA256

    9abc9d944c05490bb11efd1b190b41411db0c65cad14a210c1c59533cd6784e4

  • SHA512

    d7776f4e42a51a7eed842f4fc87282c5191a32d04c6fbc1d080bfeb6b328c35f4b0c95200874609660b166e24ea5d6958fab8a5e82b440d9d2f236569e2d1477

  • SSDEEP

    12288:6+JJG//twCZ1CFy6jpcFnRO6QuiCDuBMoCrazA:6+J6/twC1N6jiVk6Quix4f

Malware Config

Extracted

Family

emotet

Botnet

Epoch2

C2

104.193.103.61:80

104.131.123.136:443

5.196.108.189:8080

121.124.124.40:7080

87.106.139.101:8080

213.196.135.145:80

50.35.17.13:80

38.18.235.242:80

24.43.32.186:80

82.80.155.43:80

103.86.49.11:8080

113.61.66.94:80

24.137.76.62:80

187.49.206.134:80

42.200.107.142:80

24.179.13.119:80

93.147.212.206:80

108.46.29.236:80

105.186.233.33:80

37.139.21.175:8080

rsa_pubkey.plain

Targets

    • Target

      a7a6c086f7e33519b09f6a7857e203ad_JaffaCakes118

    • Size

      667KB

    • MD5

      a7a6c086f7e33519b09f6a7857e203ad

    • SHA1

      2c71ce41526d4231108eafd7b303f3ac8c6a01fa

    • SHA256

      9abc9d944c05490bb11efd1b190b41411db0c65cad14a210c1c59533cd6784e4

    • SHA512

      d7776f4e42a51a7eed842f4fc87282c5191a32d04c6fbc1d080bfeb6b328c35f4b0c95200874609660b166e24ea5d6958fab8a5e82b440d9d2f236569e2d1477

    • SSDEEP

      12288:6+JJG//twCZ1CFy6jpcFnRO6QuiCDuBMoCrazA:6+J6/twC1N6jiVk6Quix4f

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Emotet payload

      Detects Emotet payload in memory.

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Tasks