Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- emotet
- http://gobabynames.com/dz6r/xytx7/
- windows10_x64
- http://gobabynames.com/dz6r/xytx7/
- 10
- MALWARE CONFIG
- SIGNATURES
- TTP Categories1
- Signatures9
- PROCESSES6
- NETWORK
- TCP
- UDP
- REPLAY MONITOR
- BACKEND
- horse2
- MAX TIME KERNEL
- 103s
- REPORTED
- 2019-12-19T10:34:21Z
- RESOURCE
- win10v191014
- SCORE
- 10
- SUBMITTED
- 2019-12-19T10:31:45Z
- TAGS
- trojan,banker,family:emotet
- TTP
- T1112
- Target
- http://gobabynames.com/dz6r/xytx7/
- Filesize
- N/A
- Completed
- 2019-12-19 12:34
- Score
- 10
- /10
- MD5
- N/A
- SHA1
- N/A
- SHA256
- N/A
- emotet trojan banker
- Extracted
- Family
- emotet
- rsa_pubkey.plain
- -----BEGIN PUBLIC KEY-----
- MHwwDQYJKoZIhvcNAQEBBQADawAwaAJhAKl4M80uy0jcxUiFIaJJyxgHVVnFtCq6
- bi6f2xXPh/XUZNyN8UXDe5HzhTc4kwon9MBZffNwFOIc61QfV3K3YzEI/ktcyNqK
- LS67ONxsVep769QdiVQJXrIaFjMXKz6viwIDAQAB
- -----END PUBLIC KEY-----
- C2
- 1.215.28.101:8080
- 1.215.28.101:8080
- 184.167.148.162:80
- 184.167.148.162:80
- 66.25.34.20:80
- 66.25.34.20:80
- 165.227.156.155:443
- 165.227.156.155:443
- 167.99.105.223:7080
- 167.99.105.223:7080
- 67.225.179.64:8080
- 67.225.179.64:8080
- 176.31.200.130:8080
- 176.31.200.130:8080
- 190.220.19.82:443
- 190.220.19.82:443
- 91.242.138.5:443
- 91.242.138.5:443
- 159.65.25.128:8080
- 159.65.25.128:8080
- 61.197.110.214:80
- 61.197.110.214:80
- 110.143.84.202:80
- 110.143.84.202:80
- 95.128.43.213:8080
- 95.128.43.213:8080
- 91.73.197.90:80
- 91.73.197.90:80
- 201.184.105.242:443
- 201.184.105.242:443
- 108.179.206.219:8080
- 108.179.206.219:8080
- 181.57.193.14:80
- 181.57.193.14:80
- 188.152.7.140:80
- 188.152.7.140:80
- 139.130.241.252:443
- 139.130.241.252:443
- 197.254.221.174:80
- 197.254.221.174:80
- 144.139.247.220:80
- 144.139.247.220:80
- 211.63.71.72:8080
- 211.63.71.72:8080
- 165.228.24.197:80
- 165.228.24.197:80
- 31.31.77.83:443
- 31.31.77.83:443
- 110.142.38.16:80
- 110.142.38.16:80
- 78.24.219.147:8080
- 78.24.219.147:8080
- 58.171.42.66:8080
- 58.171.42.66:8080
- 64.53.242.181:8080
- 64.53.242.181:8080
- 104.137.176.186:80
- 104.137.176.186:80
- 66.209.97.122:8080
- 66.209.97.122:8080
- 50.116.86.205:8080
- 50.116.86.205:8080
- 47.6.15.79:80
- 47.6.15.79:80
- 217.160.182.191:8080
- 217.160.182.191:8080
- 206.189.112.148:8080
- 206.189.112.148:8080
- 31.172.240.91:8080
- 31.172.240.91:8080
- 86.98.156.239:443
- 86.98.156.239:443
- 182.176.132.213:8090
- 182.176.132.213:8090
- 173.91.11.142:80
- 173.91.11.142:80
- 179.13.185.19:80
- 179.13.185.19:80
- 64.147.15.138:80
- 64.147.15.138:80
- 218.44.21.114:80
- 218.44.21.114:80
- 176.106.183.253:8080
- 176.106.183.253:8080
- 120.150.246.241:80
- 120.150.246.241:80
- 87.106.136.232:8080
- 87.106.136.232:8080
- 59.148.227.190:80
- 59.148.227.190:80
- 107.170.24.125:8080
- 107.170.24.125:8080
- 116.48.142.21:443
- 116.48.142.21:443
- 75.80.148.244:80
- 75.80.148.244:80
- 37.157.194.134:443
- 37.157.194.134:443
- 45.33.49.124:443
- 45.33.49.124:443
- 190.53.135.159:21
- 190.53.135.159:21
- 128.65.154.183:443
- 128.65.154.183:443
- 201.173.217.124:443
- 201.173.217.124:443
- 100.14.117.137:80
- 100.14.117.137:80
- 93.147.141.5:80
- 93.147.141.5:80
- 206.81.10.215:8080
- 206.81.10.215:8080
- 82.27.181.93:80
- 82.27.181.93:80
- 85.152.174.56:80
- 85.152.174.56:80
- 104.131.44.150:8080
- 104.131.44.150:8080
- 178.210.51.222:8080
- 178.210.51.222:8080
- 1.33.230.137:80
- 1.33.230.137:80
- 47.156.70.145:80
- 47.156.70.145:80
- 104.131.11.150:8080
- 104.131.11.150:8080
- 2.38.99.79:80
- 2.38.99.79:80
- 31.131.182.30:80
- 31.131.182.30:80
- 46.216.60.138:80
- 46.216.60.138:80
- 209.97.168.52:8080
- 209.97.168.52:8080
- 200.7.243.108:443
- 200.7.243.108:443
- 178.209.71.63:8080
- 178.209.71.63:8080
- 73.214.99.25:80
- 73.214.99.25:80
- 85.72.180.68:80
- 85.72.180.68:80
- 85.67.10.190:80
- 85.67.10.190:80
- 183.102.238.69:465
- 183.102.238.69:465
- 209.141.54.221:8080
- 209.141.54.221:8080
- 219.78.255.48:80
- 219.78.255.48:80
- 80.21.182.46:80
- 80.21.182.46:80
- 5.88.182.250:80
- 5.88.182.250:80
- 62.75.187.192:8080
- 62.75.187.192:8080
- 68.118.26.116:80
- 68.118.26.116:80
- 101.187.134.207:443
- 101.187.134.207:443
- 92.222.216.44:8080
- 92.222.216.44:8080
- 5.154.58.24:80
- 5.154.58.24:80
- 104.236.246.93:8080
- 104.236.246.93:8080
- 149.202.153.252:8080
- 149.202.153.252:8080
- 59.103.164.174:80
- 59.103.164.174:80
- 212.64.171.206:80
- 212.64.171.206:80
- 173.12.14.133:8080
- 173.12.14.133:8080
- 195.244.215.206:80
- 195.244.215.206:80
- 47.6.15.79:443
- 47.6.15.79:443
- 45.51.40.140:80
- 45.51.40.140:80
- 73.176.241.255:80
- 73.176.241.255:80
- 37.59.24.177:8080
- 37.59.24.177:8080
- 212.129.24.79:8080
- 212.129.24.79:8080
- 12.176.19.218:80
- 12.176.19.218:80
- 110.143.57.109:80
- 110.143.57.109:80
- 81.0.63.86:8080
- 81.0.63.86:8080
- 190.189.224.117:443
- 190.189.224.117:443
- 5.196.74.210:8080
- 5.196.74.210:8080
- 46.105.131.87:80
- 46.105.131.87:80
- 82.155.161.203:80
- 82.155.161.203:80
- 87.230.19.21:8080
- 87.230.19.21:8080
- 186.75.241.230:80
- 186.75.241.230:80
- 186.67.208.78:8080
- 186.67.208.78:8080
- 174.81.132.128:80
- 174.81.132.128:80
- 138.59.177.106:443
- 138.59.177.106:443
- 211.44.35.111:80
- 211.44.35.111:80
- 66.34.201.20:7080
- 66.34.201.20:7080
- 91.205.215.66:443
- 91.205.215.66:443
- 70.175.171.251:80
- 70.175.171.251:80
- 24.93.212.32:80
- 24.93.212.32:80
- 174.77.190.137:8080
- 174.77.190.137:8080
- 31.177.54.196:443
- 31.177.54.196:443
- 83.136.245.190:8080
- 83.136.245.190:8080
- 210.6.85.121:80
- 210.6.85.121:80
- 189.209.217.49:80
- 189.209.217.49:80
- 190.147.215.53:22
- 190.147.215.53:22
- 190.12.119.180:443
- 190.12.119.180:443
- 101.187.247.29:80
- 101.187.247.29:80
- 74.105.102.97:8080
- 74.105.102.97:8080
- 70.46.247.81:80
- 70.46.247.81:80
- 192.241.255.77:8080
- 192.241.255.77:8080
- 87.106.139.101:8080
- 87.106.139.101:8080
- 167.71.10.37:8080
- 167.71.10.37:8080
- 2.237.76.249:80
- 2.237.76.249:80
- 201.251.133.92:443
- 201.251.133.92:443
- 2.235.190.23:8080
- 2.235.190.23:8080
- 173.247.19.238:80
- 173.247.19.238:80
- Defense Evasion
- Emotet
- Executes dropped EXE
- vaxEDfiRvzxlNwu.exe
- vaxEDfiRvzxlNwu.exe
- mailboxmethods.exe
- mailboxmethods.exe
- Drops file in System32 directory
- mailboxmethods.exe
- vaxEDfiRvzxlNwu.exe
- Reported IOC
- vaxEDfiRvzxlNwu.exe
- C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\89TS8EPW\vaxEDfiRvzxlNwu.exe => C:\Windows\SysWOW64\mailboxmethods.exe File renamed
- Reported IOC
- mailboxmethods.exe
- C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 File opened for modification
- C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat File opened for modification
- C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 File opened for modification
- C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE File opened for modification
- C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies File opened for modification
- Suspicious use of WriteProcessMemory
- iexplore.exe
- vaxEDfiRvzxlNwu.exe
- mailboxmethods.exe
- Reported IOC
- iexplore.exe
- PID 4948 wrote to memory of 4996
- PID 4948 wrote to memory of 4068
- Reported IOC
- vaxEDfiRvzxlNwu.exe
- PID 4068 wrote to memory of 4492
- Reported IOC
- mailboxmethods.exe
- PID 4624 wrote to memory of 4704
- Suspicious use of SetWindowsHookEx
- iexplore.exe
- IEXPLORE.EXE
- vaxEDfiRvzxlNwu.exe
- vaxEDfiRvzxlNwu.exe
- mailboxmethods.exe
- mailboxmethods.exe
- Suspicious behavior: EnumeratesProcesses
- mailboxmethods.exe
- Suspicious use of FindShellTrayWindow
- iexplore.exe
- Suspicious behavior: EmotetMutantsSpam
- vaxEDfiRvzxlNwu.exe
- mailboxmethods.exe
- Modifies Internet Explorer settings
- Matched TTPs
- Modify Registry
- Reported IOC
- Process #undefined
- \REGISTRY\USER\S-1-5-21-634046074-2673730973-2644684987-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{25043D89-2253-11EA-BD7F-CAA4BA82F157} = "0" Set value (int)
- \REGISTRY\USER\S-1-5-21-634046074-2673730973-2644684987-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" Set value (str)
- \REGISTRY\USER\S-1-5-21-634046074-2673730973-2644684987-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = 4c6bfe76f785d501 Set value (data)
- \REGISTRY\USER\S-1-5-21-634046074-2673730973-2644684987-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d01dbe0160b6d501 Set value (data)
- \REGISTRY\USER\S-1-5-21-634046074-2673730973-2644684987-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c36c9cdac63c12448d84f1a7215689fa00000000020000000000106600000001000020000000f0d40bd87a97a0c9faf222b56fa9c72360e8e410f5e21d4c496c6cbed0bd2d7c000000000e8000000002000020000000b1c372f13dab39b91220958b2149f4e982d45b789f1d7139ca98a607fccac02820000000533558faba88da67bf0876271abbbd28048b533302a2f33d52e6e401b8a72e9e40000000ee8f15b853c16c3e3dfeb137dd44c9fb582d22da2ae290295643b3f902f78e61076e15e8cdb331a3fcf01a9a1d12a19e6087c1262a92bd197b28de490d76fe01 Set value (data)
- \REGISTRY\USER\S-1-5-21-634046074-2673730973-2644684987-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" Set value (str)
- \REGISTRY\USER\S-1-5-21-634046074-2673730973-2644684987-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" Set value (int)
- \REGISTRY\USER\S-1-5-21-634046074-2673730973-2644684987-1000\Software\Microsoft\Internet Explorer\RepId\PublicId = "{EF1DBFAF-A3D5-4319-9E9E-C4D6753301E5}" Set value (str)
- \REGISTRY\USER\S-1-5-21-634046074-2673730973-2644684987-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "4193585660" Set value (int)
- \REGISTRY\USER\S-1-5-21-634046074-2673730973-2644684987-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "4268725600" Set value (int)
- \REGISTRY\USER\S-1-5-21-634046074-2673730973-2644684987-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" Set value (int)
- \REGISTRY\USER\S-1-5-21-634046074-2673730973-2644684987-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 905cd80160b6d501 Set value (data)
- \REGISTRY\USER\S-1-5-21-634046074-2673730973-2644684987-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" Set value (int)
- \REGISTRY\USER\S-1-5-21-634046074-2673730973-2644684987-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30783071" Set value (int)
- \REGISTRY\USER\S-1-5-21-634046074-2673730973-2644684987-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30783071" Set value (int)
- \REGISTRY\USER\S-1-5-21-634046074-2673730973-2644684987-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c36c9cdac63c12448d84f1a7215689fa0000000002000000000010660000000100002000000022f596f0940a482a5e58365d2c7a86ef44fb995278b8deb84cfee162cf0748a7000000000e8000000002000020000000adf69fe3983063f147fc7cb37cbad3640404fea2b8641ccb47bd871a39b64de220000000c514b9d62906971dbf90cdfd96bb66eb06d7e61ace2460929fb9e7e9c015cdfc400000007ee6ae547e3f0592329260ce4b0400d20e6e09bc63d3160b219542aec2e587387342fea4cc4bd84a84cd409181f8cce00297fbcec94cb4e21dcb3d1d8f9e51f5 Set value (data)
- \REGISTRY\USER\S-1-5-21-634046074-2673730973-2644684987-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" Set value (int)
- \REGISTRY\USER\S-1-5-21-634046074-2673730973-2644684987-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 Set value (data)
- \REGISTRY\USER\S-1-5-21-634046074-2673730973-2644684987-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" Set value (int)
- \REGISTRY\USER\S-1-5-21-634046074-2673730973-2644684987-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" Set value (int)
- \REGISTRY\USER\S-1-5-21-634046074-2673730973-2644684987-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "4193585660" Set value (int)
- \REGISTRY\USER\S-1-5-21-634046074-2673730973-2644684987-1000\Software\Microsoft\Internet Explorer\Main\DownloadWindowPlacement = 2c0000000000000000000000ffffffffffffffffffffffffffffffff100100003c000000900300001c020000 Set value (data)
- C:\Program Files\Internet Explorer\iexplore.exe
- "C:\Program Files\Internet Explorer\iexplore.exe" http://gobabynames.com/dz6r/xytx7/
- Suspicious use of WriteProcessMemorySuspicious use of SetWindowsHookExSuspicious use of FindShellTrayWindow
- PID: 4948
- C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\89TS8EPW\vaxEDfiRvzxlNwu.exe
- "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\89TS8EPW\vaxEDfiRvzxlNwu.exe"
- Suspicious use of WriteProcessMemorySuspicious use of SetWindowsHookExExecutes dropped EXE
- PID: 4068
- C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\89TS8EPW\vaxEDfiRvzxlNwu.exe
- --de8bb2f0
- Suspicious use of SetWindowsHookExExecutes dropped EXESuspicious behavior: EmotetMutantsSpam
- PID: 4492
- C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
- "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4948 CREDAT:82945 /prefetch:2
- Suspicious use of SetWindowsHookEx
- PID: 4996
- C:\Windows\SysWOW64\mailboxmethods.exe
- "C:\Windows\SysWOW64\mailboxmethods.exe"
- Suspicious use of WriteProcessMemorySuspicious use of SetWindowsHookExExecutes dropped EXE
- PID: 4624
- C:\Windows\SysWOW64\mailboxmethods.exe
- --43cbf7f0
- Suspicious use of SetWindowsHookExExecutes dropped EXESuspicious behavior: EnumeratesProcessesSuspicious behavior: EmotetMutantsSpam
- PID: 4704
- GET
- 200
- 104.238.220.186:80
- http://gobabynames.com/dz6r/xytx7/
- IEXPLORE.EXE
- 104.238.220.186:80
- gobabynames.com
- IEXPLORE.EXE
- 72.21.81.200:443
- iecvlist.microsoft.com
- iexplore.exe
- 8.248.109.254:80
- ctldl.windowsupdate.com
- iexplore.exe
- 93.184.220.29:80
- ocsp.digicert.com
- iexplore.exe
- 72.21.81.200:443
- iecvlist.microsoft.com
- 52.109.32.27:443
- officeclient.microsoft.com
- 52.109.124.21:443
- nexus.officeapps.live.com
- 1.215.28.101:8080
- mailboxmethods.exe
- 52.109.12.18:443
- nexusrules.officeapps.live.com
- 127.0.0.1:47001
- HEAD
- 200
- 104.81.140.70:443
- https://fs.microsoft.com/fs/windows/fontset-2017-04.json
- 8.248.109.254:80
- ctldl.windowsupdate.com
- 104.81.140.70:443
- fs.microsoft.com
- 104.81.140.70:443
- fs.microsoft.com
- 104.81.140.70:443
- fs.microsoft.com
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement