Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- REM https://imgur.com/a/KBSp8MH
- REM
- REM
- REM
- Target http://medyumfatih.site/cgi-bin/x92
- Filesize
- N/A
- Completed
- 2020-01-15 14:38
- Score 10/10
- MD5
- N/A
- SHA1
- N/A
- SHA256
- N/A
- emotet evasion trojan banker
- Extracted
- Family
- emotet
- rsa_pubkey.plain
- -----BEGIN PUBLIC KEY-----
- MHwwDQYJKoZIhvcNAQEBBQADawAwaAJhAKl4M80uy0jcxUiFIaJJyxgHVVnFtCq6
- bi6f2xXPh/XUZNyN8UXDe5HzhTc4kwon9MBZffNwFOIc61QfV3K3YzEI/ktcyNqK
- LS67ONxsVep769QdiVQJXrIaFjMXKz6viwIDAQAB
- -----END PUBLIC KEY-----
- C2
- 66.7.242.50:8080
- 66.7.242.50:8080
- 72.186.137.156:80
- 72.186.137.156:80
- 197.89.27.26:8080
- 197.89.27.26:8080
- 91.250.96.22:8080
- 91.250.96.22:8080
- 37.187.72.193:8080
- 37.187.72.193:8080
- 104.131.44.150:8080
- 104.131.44.150:8080
- 167.71.10.37:8080
- 167.71.10.37:8080
- 78.24.219.147:8080
- 78.24.219.147:8080
- 159.65.25.128:8080
- 159.65.25.128:8080
- 95.128.43.213:8080
- 95.128.43.213:8080
- 179.13.185.19:80
- 179.13.185.19:80
- 186.86.247.171:443
- 186.86.247.171:443
- 110.142.38.16:80
- 110.142.38.16:80
- 201.173.217.124:443
- 201.173.217.124:443
- 169.239.182.217:8080
- 169.239.182.217:8080
- 211.63.71.72:8080
- 211.63.71.72:8080
- 104.131.11.150:8080
- 104.131.11.150:8080
- 190.55.181.54:443
- 190.55.181.54:443
- 209.146.22.34:443
- 209.146.22.34:443
- 64.53.242.181:8080
- 64.53.242.181:8080
- 190.220.19.82:443
- 190.220.19.82:443
- 66.34.201.20:7080
- 66.34.201.20:7080
- 27.109.153.201:8090
- 27.109.153.201:8090
- 46.105.131.69:443
- 46.105.131.69:443
- 110.36.217.66:8080
- 110.36.217.66:8080
- 120.151.135.224:80
- 120.151.135.224:80
- 73.217.39.73:80
- 73.217.39.73:80
- 87.230.19.21:8080
- 87.230.19.21:8080
- 47.180.91.213:80
- 47.180.91.213:80
- 73.11.153.178:8080
- 73.11.153.178:8080
- 45.33.49.124:443
- 45.33.49.124:443
- 209.141.54.221:8080
- 209.141.54.221:8080
- 121.88.5.176:443
- 121.88.5.176:443
- 31.31.77.83:443
- 31.31.77.83:443
- 79.159.249.152:80
- 79.159.249.152:80
- 178.237.139.83:8080
- 178.237.139.83:8080
- 180.92.239.110:8080
- 180.92.239.110:8080
- 201.229.45.222:8080
- 201.229.45.222:8080
- 173.21.26.90:80
- 173.21.26.90:80
- 200.116.145.225:443
- 200.116.145.225:443
- 221.165.123.72:80
- 221.165.123.72:80
- 217.160.182.191:8080
- 217.160.182.191:8080
- 47.6.15.79:80
- 47.6.15.79:80
- 60.231.217.199:8080
- 60.231.217.199:8080
- 91.205.215.66:443
- 91.205.215.66:443
- 182.176.132.213:8090
- 182.176.132.213:8090
- 181.143.126.170:80
- 181.143.126.170:80
- 70.169.53.234:80
- 70.169.53.234:80
- 176.106.183.253:8080
- 176.106.183.253:8080
- 92.222.216.44:8080
- 92.222.216.44:8080
- 87.106.136.232:8080
- 87.106.136.232:8080
- 103.86.49.11:8080
- 103.86.49.11:8080
- 5.196.74.210:8080
- 5.196.74.210:8080
- 78.142.114.69:80
- 78.142.114.69:80
- 105.247.123.133:8080
- 105.247.123.133:8080
- 47.6.15.79:443
- 47.6.15.79:443
- 98.174.166.205:80
- 98.174.166.205:80
- 110.143.84.202:80
- 110.143.84.202:80
- 95.213.236.64:8080
- 95.213.236.64:8080
- 2.237.76.249:80
- 2.237.76.249:80
- 45.51.40.140:80
- 45.51.40.140:80
- 91.73.197.90:80
- 91.73.197.90:80
- 78.186.5.109:443
- 78.186.5.109:443
- 120.150.246.241:80
- 120.150.246.241:80
- 195.244.215.206:80
- 195.244.215.206:80
- 58.171.42.66:8080
- 58.171.42.66:8080
- 190.117.126.169:80
- 190.117.126.169:80
- 37.157.194.134:443
- 37.157.194.134:443
- 192.241.255.77:8080
- 192.241.255.77:8080
- 190.12.119.180:443
- 190.12.119.180:443
- 190.117.226.104:80
- 190.117.226.104:80
- 116.48.142.21:443
- 116.48.142.21:443
- 200.21.90.5:443
- 200.21.90.5:443
- 62.75.187.192:8080
- 62.75.187.192:8080
- 41.60.200.34:80
- 41.60.200.34:80
- 70.46.247.81:80
- 70.46.247.81:80
- 85.67.10.190:80
- 85.67.10.190:80
- 223.197.185.60:80
- 223.197.185.60:80
- 190.146.205.227:8080
- 190.146.205.227:8080
- 62.138.26.28:8080
- 62.138.26.28:8080
- 5.32.55.214:80
- 5.32.55.214:80
- 108.191.2.72:80
- 108.191.2.72:80
- 59.103.164.174:80
- 59.103.164.174:80
- 178.153.176.124:80
- 178.153.176.124:80
- 78.189.180.107:80
- 78.189.180.107:80
- 87.106.139.101:8080
- 87.106.139.101:8080
- 210.6.85.121:80
- 210.6.85.121:80
- 47.156.70.145:80
- 47.156.70.145:80
- 173.91.11.142:80
- 173.91.11.142:80
- 31.172.240.91:8080
- 31.172.240.91:8080
- 88.249.120.205:80
- 88.249.120.205:80
- 37.139.21.175:8080
- 37.139.21.175:8080
- 115.95.6.218:443
- 115.95.6.218:443
- 206.81.10.215:8080
- 206.81.10.215:8080
- 105.27.155.182:80
- 105.27.155.182:80
- 209.97.168.52:8080
- 209.97.168.52:8080
- 205.185.117.108:8080
- 205.185.117.108:8080
- 24.164.79.147:8080
- 24.164.79.147:8080
- 188.0.135.237:80
- 188.0.135.237:80
- 139.130.242.43:80
- 139.130.242.43:80
- 46.105.131.87:80
- 46.105.131.87:80
- 189.203.177.41:443
- 189.203.177.41:443
- 149.202.153.252:8080
- 149.202.153.252:8080
- 98.156.206.153:80
- 98.156.206.153:80
- 160.16.215.66:8080
- 160.16.215.66:8080
- 201.184.105.242:443
- 201.184.105.242:443
- 98.30.113.161:80
- 98.30.113.161:80
- 5.154.58.24:80
- 5.154.58.24:80
- 173.66.96.135:80
- 173.66.96.135:80
- 206.189.112.148:8080
- 206.189.112.148:8080
- 70.175.171.251:80
- 70.175.171.251:80
- 190.53.135.159:21
- 190.53.135.159:21
- 24.105.202.216:443
- 24.105.202.216:443
- 89.211.186.227:443
- 89.211.186.227:443
- 108.179.206.219:8080
- 108.179.206.219:8080
- 139.130.241.252:443
- 139.130.241.252:443
- 50.116.86.205:8080
- 50.116.86.205:8080
- 181.126.70.117:80
- 181.126.70.117:80
- 24.94.237.248:80
- 24.94.237.248:80
- 62.75.141.82:80
- 62.75.141.82:80
- 183.102.238.69:465
- 183.102.238.69:465
- 177.239.160.121:80
- 177.239.160.121:80
- 104.236.246.93:8080
- 104.236.246.93:8080
- 47.153.183.211:80
- 47.153.183.211:80
- Discovery
- Defense Evasion
- Emotet Executes dropped EXE
- I0Pqnp7f.exe
- I0Pqnp7f.exe
- nicspeed.exe
- nicspeed.exe
- Checks whether UAC is enabled
- iexplore.exe
- IEXPLORE.EXE
- iexplore.exe
- IEXPLORE.EXE
- Drops file in System32 directory
- I0Pqnp7f.exe
- nicspeed.exe
- Suspicious use of WriteProcessMemory
- iexplore.exe
- I0Pqnp7f.exe
- nicspeed.exe
- iexplore.exe
- Suspicious use of SetWindowsHookEx
- iexplore.exe
- IEXPLORE.EXE
- I0Pqnp7f.exe
- I0Pqnp7f.exe
- nicspeed.exe
- nicspeed.exe
- iexplore.exe
- IEXPLORE.EXE
- Suspicious use of FindShellTrayWindow
- iexplore.exe
- iexplore.exe
- Suspicious behavior: EmotetMutantsSpam
- I0Pqnp7f.exe
- nicspeed.exe
- Suspicious behavior: GetForegroundWindowSpam
- iexplore.exe
- Modifies registry class
- iexplore.exe
- Suspicious behavior: EnumeratesProcesses
- nicspeed.exe
- powershell.exe
- Suspicious use of AdjustPrivilegeToken
- powershell.exe
- Modifies Internet Explorer settings
- iexplore.exe
- IEXPLORE.EXE
- iexplore.exe
- IEXPLORE.EXE
- C:\Program Files\Internet Explorer\iexplore.exe
- "C:\Program Files\Internet Explorer\iexplore.exe" http://medyumfatih.site/cgi-bin/x92
- PID: 4924
- C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\YL65JTKG\I0Pqnp7f.exe
- "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\YL65JTKG\I0Pqnp7f.exe"
- PID: 4364
- C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\YL65JTKG\I0Pqnp7f.exe
- --8057fabe
- PID: 4292
- C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
- "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4924 CREDAT:82945 /prefetch:2
- PID: 4976
- C:\Windows\SysWOW64\nicspeed.exe
- "C:\Windows\SysWOW64\nicspeed.exe"
- PID: 3748
- C:\Windows\SysWOW64\nicspeed.exe
- --a41af991
- PID: 4028
- C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
- "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
- PID: 4504
- C:\Program Files\Internet Explorer\iexplore.exe
- "C:\Program Files\Internet Explorer\iexplore.exe"
- PID: 1236
- C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
- "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1236 CREDAT:82945 /prefetch:2
- PID: 1544
- GET
- 200
- 144.76.182.168:80
- http://medyumfatih.site/cgi-bin/x92/
- IEXPLORE.EXE
- 144.76.182.168:80
- medyumfatih.site
- IEXPLORE.EXE
- 95.101.192.162:443
- go.microsoft.com
- 95.101.192.162:443
- go.microsoft.com
- 93.184.221.240:80
- ctldl.windowsupdate.com
- 93.184.221.240:80
- ctldl.windowsupdate.com
- GET
- 200
- 93.184.220.29:80
- http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8sEMlbBsCTf7jUSfg%2BhWk%3D
- 104.81.140.150:443
- support.microsoft.com
- 104.81.140.150:443
- support.microsoft.com
- 95.100.198.11:443
- www.microsoft.com
- 95.100.198.11:443
- www.microsoft.com
- 104.81.140.150:443
- support.microsoft.com
- 95.100.97.130:443
- statics-marketingsites-neu-ms-com.akamaized.net
- 95.100.97.130:443
- statics-marketingsites-neu-ms-com.akamaized.net
- 104.81.140.150:443
- support.microsoft.com
- 104.81.140.150:443
- support.microsoft.com
- 104.81.140.150:443
- support.microsoft.com
- 95.100.97.43:443
- img-prod-cms-rt-microsoft-com.akamaized.net
- 95.100.97.43:443
- img-prod-cms-rt-microsoft-com.akamaized.net
- 88.221.11.132:443
- mem.gfx.ms
- 88.221.11.132:443
- mem.gfx.ms
- 95.100.198.11:443
- www.microsoft.com
- 95.100.198.11:443
- www.microsoft.com
- 40.90.22.187:443
- login.live.com
- GET
- 200
- 93.184.220.29:80
- http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEAi4elAbvpzaLRZNPjlRv1U%3D
- 104.81.140.150:443
- support.microsoft.com
- 104.81.140.150:443
- support.microsoft.com
- 40.77.226.250:443
- web.vortex.data.microsoft.com
- 40.77.226.250:443
- web.vortex.data.microsoft.com
- 40.90.22.187:443
- login.live.com
- 40.90.22.187:443
- login.live.com
- 40.90.22.187:443
- login.live.com
- 23.222.32.178:443
- compass-ssl.microsoft.com
- 23.222.32.178:443
- compass-ssl.microsoft.com
- 20.190.137.98:443
- login.microsoftonline.com
- 20.190.137.98:443
- login.microsoftonline.com
- 104.18.24.243:80
- ocsp.msocsp.com
- 13.107.246.10:443
- logincdn.msauth.net
- 13.107.246.10:443
- logincdn.msauth.net
- 117.18.232.200:443
- iecvlist.microsoft.com
- iexplore.exe
- 117.18.232.200:443
- iecvlist.microsoft.com
- IEXPLORE.EXE
- 52.109.76.6:443
- officeclient.microsoft.com
- 52.109.120.23:443
- nexus.officeapps.live.com
- 52.109.88.36:443
- nexusrules.officeapps.live.com
- 66.7.242.50:8080
- nicspeed.exe
- 204.79.197.200:443
- ieonline.microsoft.com
- iexplore.exe
- 204.79.197.200:443
- ieonline.microsoft.com
- iexplore.exe
- 127.0.0.1:47001
- 93.184.221.240:80
- ctldl.windowsupdate.com
- 104.81.140.70:443
- fs.microsoft.com
- 104.81.140.70:443
- fs.microsoft.com
- 104.81.140.70:443
- fs.microsoft.com
- 104.81.140.70:443
- fs.microsoft.com
Add Comment
Please, Sign In to add comment