Windows
Analysis Report
cGOpAkgTL.exe
Overview
General Information
Sample Name: | cGOpAkgTL.exe (renamed file extension from bin to exe, renamed because original name is a hash value) |
Original Sample Name: | cGOpAkgTL.bin |
Analysis ID: | 861748 |
MD5: | b5e31f4e2836b8a67f8684988d224107 |
SHA1: | 9816f30629d210b64742be970d412512df600c11 |
SHA256: | efed59c2b1473891a2032927baebe69c87dcace3d87e0b359fe583bbe9181b9b |
Infos: | |
Detection
CryptOne, Emotet
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Antivirus / Scanner detection for submitted sample
Yara detected Emotet
Detected CryptOne packer
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Machine Learning detection for sample
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Drops executables to the windows directory (C:\Windows) and starts them
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
Deletes files inside the Windows folder
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
Internet Provider seen in connection with other malware
Program does not show much activity (idle)
IP address seen in connection with other malware
Uses a known web browser user agent for HTTP communication
Drops PE files to the windows directory (C:\Windows)
Connects to several IPs in different countries
PE / OLE file has an invalid certificate
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Creates a process in suspended mode (likely to inject code)
Classification
- System is w7x64
cGOpAkgTL.exe (PID: 2412 cmdline:
C:\Users\u ser\Deskto p\cGOpAkgT L.exe MD5: B5E31F4E2836B8A67F8684988D224107) cGOpAkgTL.exe (PID: 2592 cmdline:
C:\Users\u ser\Deskto p\cGOpAkgT L.exe MD5: B5E31F4E2836B8A67F8684988D224107)
mapirepl.exe (PID: 1764 cmdline:
C:\Windows \SysWOW64\ mapirepl.e xe MD5: B5E31F4E2836B8A67F8684988D224107) mapirepl.exe (PID: 1624 cmdline:
C:\Windows \SysWOW64\ mapirepl.e xe MD5: B5E31F4E2836B8A67F8684988D224107)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Emotet | While Emotet historically was a banking malware organized in a botnet, nowadays Emotet is mostly seen as infrastructure as a service for content delivery. For example, since mid 2018 it is used by Trickbot for installs, which may also lead to ransomware attacks using Ryuk, a combination observed several times against high-profile targets.It is always stealing information from victims but what the criminal gang behind it did, was to open up another business channel by selling their infrastructure delivering additional malicious software. From malware analysts it has been classified into epochs depending on command and control, payloads, and delivery solutions which change over time.Emotet had been taken down by authorities in January 2021, though it appears to have sprung back to life in November 2021. |
{"C2 list": ["104.33.204.83:443", "164.77.138.194:80", "181.16.4.180:80", "190.117.51.248:443", "23.240.26.210:80", "190.111.215.2:80", "85.105.205.77:8080", "143.0.245.169:8080", "200.55.136.2:443", "186.23.186.99:443", "51.255.50.164:8080", "192.163.199.254:8080", "23.254.203.51:8080", "72.47.248.48:8080", "69.163.33.82:8080", "73.115.132.124:80", "190.144.66.30:8080", "186.137.133.132:8080", "109.104.79.48:8080", "66.209.69.165:443", "210.2.86.72:8080", "189.208.239.98:443", "201.184.224.178:80", "92.48.118.27:8080", "173.248.147.186:80", "138.68.139.199:443", "219.94.254.93:8080", "185.86.148.222:8080", "144.76.117.247:8080", "70.28.3.120:7080", "165.227.213.173:8080", "159.65.76.245:443", "209.159.244.240:443", "5.9.128.163:8080", "190.171.105.158:7080", "184.161.177.223:8080", "186.138.205.189:80"]}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Emotet | Yara detected Emotet | Joe Security | ||
Emotet | Emotet Payload | kevoreilly |
| |
JoeSecurity_Emotet | Yara detected Emotet | Joe Security | ||
Emotet | Emotet Payload | kevoreilly |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Emotet | Yara detected Emotet | Joe Security | ||
Emotet | Emotet Payload | kevoreilly |
| |
JoeSecurity_Emotet | Yara detected Emotet | Joe Security | ||
JoeSecurity_Emotet | Yara detected Emotet | Joe Security | ||
JoeSecurity_Emotet | Yara detected Emotet | Joe Security | ||
Click to see the 3 entries |
⊘No Sigma rule has matched
⊘No Snort rule has matched
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Malware Configuration Extractor: |