Reverse engineering Emotet – Our approach to protect GRNET against the trojan
Common Information
Type Value
UUID 2b5761b3-e686-4445-9db6-026bdcff36a2
Fingerprint 2c80993364af1e09
Analysis status DONE
Considered CTI value 0
Text language
Published Feb. 8, 2021, midnight
Added to db Sept. 26, 2022, 9:30 a.m.
Last updated Nov. 17, 2024, 6:55 p.m.
Headline Reverse engineering Emotet – Our approach to protect GRNET against the trojan
Title Reverse engineering Emotet – Our approach to protect GRNET against the trojan
Detected Hints/Tags/Attributes 110/3/44
Attributes
Details Type #Events CTI Value
Details Domain 1174
gmail.com
Details Domain 5
document.open
Details Domain 1
system.ne
Details Domain 7
system.io.directory
Details Domain 339
system.net
Details Domain 1
hn.com
Details Domain 7
se.com
Details Domain 1
blog.ma
Details Domain 1
ck.com
Details Domain 2
www.fr
Details Domain 1
id.com
Details Domain 1
ed.com
Details Domain 1
rm.com
Details Domain 1
bc.com
Details Domain 1
resourceinfo.name
Details Domain 19
client.py
Details File 1
n1pjur3u.exe
Details File 1
generate_symbol_hashes1.py
Details File 533
ntdll.dll
Details File 748
kernel32.dll
Details File 1
generate_symbol_hashes2.py
Details File 1
decrypt_bytes.py
Details File 1
nested-payload-2.exe
Details File 69
shlwapi.dll
Details File 306
services.exe
Details File 1
extract_c2_socket_addresses.py
Details File 10
searchfilterhost.exe
Details File 23
searchprotocolhost.exe
Details File 117
taskmgr.exe
Details File 137
conhost.exe
Details File 1208
powershell.exe
Details File 380
notepad.exe
Details File 172
dllhost.exe
Details File 1
c:\users\ieuser\appdata\local\dxdiag\reg.exe
Details File 19
client.py
Details IPv4 3
46.101.58.37
Details Url 1
http://in*******hn.com/wp-admin/sa
Details Url 1
http://sh*******se.com/wp-includes/id3/idz
Details Url 1
http://blog.ma********ck.com/wp-admin/spq
Details Url 1
https://www.fr*********id.com/wp-content/g
Details Url 1
https://pe********ed.com/vmware-unlocker/dac
Details Url 1
https://me*******rm.com/wp-admin/lb
Details Url 1
http://ie*******bc.com/cow/2bb
Details Windows Registry Key 47
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run