2018-06-26 - QUICK POST: EMOTET INFECTION WITH ICEDID
NOTICE:
- The zip archives on this page have been updated, and they now use the new password scheme. For the new password, see the "about" page of this website.
ASSOCIATED FILES:
- 2018-06-26-ten-examples-of-Emotet-malspam.txt.zip 2.6 kB (2,617 bytes)
- 2018-06-26-Emotet-infection-with-IcedID-in-AD-environment.pcap.zip 2.9 MB (2,923,730 bytes)
- 2018-06-26-malware-from-Emotet-with-IcedID-infection.zip 634 kB (633,709 bytes)
NOTES:
- This infection was generated in an Active Directory environment. The network parameters are:
- LAN segment: 172.16.5[.]0/24
- Gateway: 172.16.5[.]1
- Broadcast address: 172.16.5[.]255
- Domain controller IP address: 172.16.5[.]9
- Domain controller host name: RAPTOR-NAV-DC
- Domain name: raptor-nav[.]com
- Windows client IP address: 172.16.5[.]195
- Windows client host name: Snow-Patrol-PC
- Windows client user account name: raymundo.snow
Shown above: One of the emails in raw plain text (.eml format).
Shown above: Example of a Word document from link in the malspam.
Shown above: Traffic from the infection filtered in Wireshark.
Shown above: Malware persistent on the infected Windows host.
Click here to return to the main page.