General

  • Target

    17c3f23b82904e03d17af63a80afcc3d5559860846d20ddda13ba87d7f531020_NeikiAnalytics.exe

  • Size

    31KB

  • MD5

    331c4c7b1c0eb33512441ad84be1bdf0

  • SHA1

    976e29841bef9598c227a3e9d5ac21da3c5a938a

  • SHA256

    17c3f23b82904e03d17af63a80afcc3d5559860846d20ddda13ba87d7f531020

  • SHA512

    b4d27680fde34b8903d35fb586a3463d5eb87f3f56c5783981a53bd25cc2f9ab322a5f2f21f04a16a97273873ef82e023903f81dc2c41e579a9badc0d150cc62

  • SSDEEP

    768:O1e0CMRmcc7txXyubeHZ68HMNsunzVcwr2hQN25p/:O1jmLtvv6juzVtr2hy6

Malware Config

Extracted

Family

emotet

Botnet

Epoch1

C2

179.60.229.168:443

185.94.252.13:443

189.218.165.63:80

77.90.136.129:8080

217.199.160.224:7080

104.131.41.185:8080

2.47.112.152:80

185.94.252.27:443

186.250.52.226:8080

51.255.165.160:8080

68.183.170.114:8080

191.99.160.58:80

104.131.103.37:8080

181.31.211.181:80

202.62.39.111:80

83.169.21.32:7080

87.106.46.107:8080

72.47.248.48:7080

177.75.143.112:443

190.17.195.202:80

rsa_pubkey.plain

Signatures

  • Emotet family
  • Emotet payload 1 IoCs

    Detects Emotet payload in memory.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 17c3f23b82904e03d17af63a80afcc3d5559860846d20ddda13ba87d7f531020_NeikiAnalytics.exe
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections