2018-07-31 - TWO INFECTIONS: EMOTET WITH TRICKBOT & EMOTET WITH ZEUS PANDA BANKER
NOTICE:
- The zip archives on this page have been updated, and they now use the new password scheme. For the new password, see the "about" page of this website.
 
ASSOCIATED FILES:
- 2018-07-31-three-Emotet-malspam-examples.zip 4.4 kB (4,417 bytes)
 
- 2018-07-30-Emotet-malspam-0825-UTC.eml (967 bytes)
 - 2018-07-30-Emotet-malspam-2031-UTC.eml (7,116 bytes)
 - 2018-07-31-Emotet-malspam-0945-UTC.eml (1,347 bytes)
 
- 2018-07-31-Emotet-infection-traffic-both-pcaps.zip 7.5 MB (7,527,624 bytes)
 
- 2018-07-31-Emotet-infection-with-Trickbot.pcap (5,767,774 bytes)
 - 2018-07-31-Emotet-infection-with-Zeus-Panda-Banker.pcap (2,336,550 bytes)
 
- 2018-07-31-malware-associated-with-Emotet-infection.zip 881 kB (881,027 bytes)
 
- 2018-07-31-Emotet-malware-binary-1-of-3.exe (131,584 bytes)
 - 2018-07-31-Emotet-malware-binary-2-of-3.exe (131,584 bytes)
 - 2018-07-31-Emotet-malware-binary-3-of-3.exe (133,120 bytes)
 - 2018-07-31-Trickbot-retrieved-suing-Emotet-infection.exe (327,168 bytes)
 - 2018-07-31-Zeus-Panda-Banker-retrieved-suing-Emotet-infection.exe (136,704 bytes)
 - 2018-07-31-downloaded-Word-doc-with-macro-for-Emotet-1-of-4.doc (101,248 bytes)
 - 2018-07-31-downloaded-Word-doc-with-macro-for-Emotet-2-of-4.doc (93,440 bytes)
 - 2018-07-31-downloaded-Word-doc-with-macro-for-Emotet-3-of-4.doc (100,224 bytes)
 - 2018-07-31-downloaded-Word-doc-with-macro-for-Emotet-4-of-4.doc (88,576 bytes)
 
WEB TRAFFIC BLOCK LIST
Indicators are not a block list. If you feel the need to block web traffic, I suggest the following domain and URLs:
- humoronoff[.]top
 - hxxp[:]//aktuelldata-ev[.]de/files/US/Address-Update/
 - hxxp[:]//bodycorporatecollective[.]com[.]au/newsletter/EN_en/Address-Update/
 - hxxp[:]//canadary[.]com/JyblntYRbo/
 - hxxp[:]//connievoigt[.]cl/sites/Rechnung/FORM/Rechnung-UX-31-60671/
 - hxxp[:]//consultorialyceum[.]com[.]br/loDjMtPpTaavXhB3pME9/
 - hxxp[:]//eco3academia[.]com[.]br/default/de/Zahlung/RechnungsDetails-DW-03-40777/
 - hxxp[:]//elkasen.szczecin[.]pl/newsletter/En_us/OVERDUE-ACCOUNT/invoice/
 - hxxp[:]//hostile-gaming[.]fr/DHL-Express/US/
 - hxxp[:]//it-club[.]kg/doc/En/Payment-details/
 - hxxp[:]//kermain-valley[.]com/default/Rechnungs-Details/FORM/RechnungScan-BBK-64-93981/
 - hxxp[:]//khanandmuezzin[.]com/doc/En/Invoice-for-sent/Account-35484/
 - hxxp[:]//klvanrental[.]com[.]my/djwVH7ITcXQs63j0Nu/
 - hxxp[:]//milesaway[.]pl/Jul2018/US/Payment-with-a-new-address/
 - hxxp[:]//myworkathomesite[.]com/files/US_us/Payment-details/
 - hxxp[:]//new.allfn[.]com/sites/En/New-Address/
 - hxxp[:]//nz.dilmah[.]com/doc/US/Change-of-Address/
 - hxxp[:]//ordos[.]su/DHL-Express/En_us/
 - hxxp[:]//prosourcedpartners[.]com/Jul2018/US/New-payment-details-and-address-update/
 - hxxp[:]//relib[.]fr/Jul2018/Rech/Fakturierung/RechnungsDetails-YQ-22-72307/
 - hxxp[:]//restauracja.wislaa[.]pl/newsletter/EN_en/New-payment-details-and-address-update/
 - hxxp[:]//satyam[.]cl/plugins/doc/Rechnungs-Details/Rechnungszahlung/Erinnerung-an-die-Rechnungszahlung-LMW-42-41967/
 - hxxp[:]//sesisitmer[.]com/wp-content/Q90wNLaF01HWQa6oHAp/
 - hxxp[:]//sevgidugunsalonu[.]net/files/En_us/Address-Changed/
 - hxxp[:]//shopinterbuild[.]com/sqlbak/9rSN69yzI4Vdv894/
 - hxxp[:]//silver-n-stone[.]com/default/En/Payment-details/
 - hxxp[:]//solvensplus[.]co[.]rs/DHL-Express/En/
 - hxxp[:]//theboomworks[.]com/default/En_us/Address-and-payment-info/
 - hxxp[:]//thonglorpetblog[.]com/petcare/DHL-Tracking/EN_en/
 - hxxp[:]//tiendaepica[.]com/newsletter/US/Address-Update/
 - hxxp[:]//www.ultigamer[.]com/wp-admin/includes/Jul2018/Dokumente/Hilfestellung/Rechnungszahlung-TY-65-37307/
 - hxxp[:]//weliketomoveit[.]ca/default/EN_en/Address-Update/
 - hxxp[:]//www.shopinterbuild[.]com/sqlbak/9rSN69yzI4Vdv894/
 - hxxp[:]//agrocoeli[.]com/chfEBi
 - hxxp[:]//canevazzi[.]com[.]br/R7v
 - hxxp[:]//challengerballtournament[.]com/E
 - hxxp[:]//consultoresyempresas[.]com/QQRLe5a
 - hxxp[:]//cranmorelodge[.]co[.]uk/aU0o0
 - hxxp[:]//fundacionafanic[.]com/TsZLHoZU
 - hxxp[:]//fufu[.]com[.]mx/UQANpB
 - hxxp[:]//nonglek[.]net/7CR
 - hxxp[:]//tonysmarineservice[.]co[.]uk/gbsi00
 - hxxp[:]//www.leathershop77[.]com/bweFbo9
 - hxxp[:]//188.124.167[.]132:8082/mon1/
 - hxxp[:]//71.202.205[.]235/whoami.php
 
EMAILS

Shown above:  Example of the malspam (1 of 3).

Shown above:  Example of the malspam (2 of 3).

Shown above:  Example of the malspam (3 of 3).
INFECTION TRAFFIC

Shown above:  Traffic from an infection filtered in Wireshark (Emotet + Trickbot).

Shown above:  Traffic from an infection filtered in Wireshark (Emotet + Zeus Panda Banker).
LINKS IN THE EMAILS TO DOWNLOAD THE MALICIOUS WORD DOCUMENT:
- hxxp[:]//aktuelldata-ev[.]de/files/US/Address-Update/
 - hxxp[:]//bodycorporatecollective[.]com[.]au/newsletter/EN_en/Address-Update/
 - hxxp[:]//canadary[.]com/JyblntYRbo/
 - hxxp[:]//connievoigt[.]cl/sites/Rechnung/FORM/Rechnung-UX-31-60671/
 - hxxp[:]//consultorialyceum[.]com[.]br/loDjMtPpTaavXhB3pME9/
 - hxxp[:]//eco3academia[.]com[.]br/default/de/Zahlung/RechnungsDetails-DW-03-40777/
 - hxxp[:]//elkasen.szczecin[.]pl/newsletter/En_us/OVERDUE-ACCOUNT/invoice/
 - hxxp[:]//hostile-gaming[.]fr/DHL-Express/US/
 - hxxp[:]//it-club[.]kg/doc/En/Payment-details/
 - hxxp[:]//kermain-valley[.]com/default/Rechnungs-Details/FORM/RechnungScan-BBK-64-93981/
 - hxxp[:]//khanandmuezzin[.]com/doc/En/Invoice-for-sent/Account-35484/
 - hxxp[:]//klvanrental[.]com[.]my/djwVH7ITcXQs63j0Nu/
 - hxxp[:]//milesaway[.]pl/Jul2018/US/Payment-with-a-new-address/
 - hxxp[:]//myworkathomesite[.]com/files/US_us/Payment-details/
 - hxxp[:]//new.allfn[.]com/sites/En/New-Address/
 - hxxp[:]//nz.dilmah[.]com/doc/US/Change-of-Address/
 - hxxp[:]//ordos[.]su/DHL-Express/En_us/
 - hxxp[:]//prosourcedpartners[.]com/Jul2018/US/New-payment-details-and-address-update/
 - hxxp[:]//relib[.]fr/Jul2018/Rech/Fakturierung/RechnungsDetails-YQ-22-72307/
 - hxxp[:]//restauracja.wislaa[.]pl/newsletter/EN_en/New-payment-details-and-address-update/
 - hxxp[:]//satyam[.]cl/plugins/doc/Rechnungs-Details/Rechnungszahlung/Erinnerung-an-die-Rechnungszahlung-LMW-42-41967/
 - hxxp[:]//sesisitmer[.]com/wp-content/Q90wNLaF01HWQa6oHAp/
 - hxxp[:]//sevgidugunsalonu[.]net/files/En_us/Address-Changed/
 - hxxp[:]//shopinterbuild[.]com/sqlbak/9rSN69yzI4Vdv894/
 - hxxp[:]//silver-n-stone[.]com/default/En/Payment-details/
 - hxxp[:]//solvensplus[.]co[.]rs/DHL-Express/En/
 - hxxp[:]//theboomworks[.]com/default/En_us/Address-and-payment-info/
 - hxxp[:]//thonglorpetblog[.]com/petcare/DHL-Tracking/EN_en/
 - hxxp[:]//tiendaepica[.]com/newsletter/US/Address-Update/
 - hxxp[:]//www.ultigamer[.]com/wp-admin/includes/Jul2018/Dokumente/Hilfestellung/Rechnungszahlung-TY-65-37307/
 - hxxp[:]//weliketomoveit[.]ca/default/EN_en/Address-Update/
 - hxxp[:]//www.shopinterbuild[.]com/sqlbak/9rSN69yzI4Vdv894/
 
URLS FOR THE FOLLOW-UP EMOTET MALWARE:
- hxxp[:]//agrocoeli[.]com/chfEBi
 - hxxp[:]//canevazzi[.]com[.]br/R7v
 - hxxp[:]//challengerballtournament[.]com/E
 - hxxp[:]//consultoresyempresas[.]com/QQRLe5a
 - hxxp[:]//cranmorelodge[.]co[.]uk/aU0o0
 - hxxp[:]//fundacionafanic[.]com/TsZLHoZU
 - hxxp[:]//fufu[.]com[.]mx/UQANpB
 - hxxp[:]//nonglek[.]net/7CR
 - hxxp[:]//tonysmarineservice[.]co[.]uk/gbsi00
 - hxxp[:]//www.leathershop77[.]com/bweFbo9
 
TRAFFIC FROM AN INFECTED WINDOWS HOST (EMOTET + TRICKBOT):
- 81.88.48[.]95 port 80 - kermain-valley[.]com - GET /default/Rechnungs-Details/FORM/RechnungScan-BBK-64-93981/
 - 82.145.53[.]206 port 80 - tonysmarineservice[.]co[.]uk - GET /gbsi00
 - 191.252.137[.]134 port 80 - canevazzi[.]com[.]br - GET /R7v
 - 50.87.105[.]242 port 80 - fufu[.]com[.]mx - GET /UQANpB
 - 50.87.105[.]242 port 80 - fufu[.]com[.]mx - GET /cgi-sys/suspendedpage.cgi
 - 176.32.230[.]49 port 80 - cranmorelodge[.]co[.]uk - GET /aU0o0
 - 176.32.230[.]49 port 80 - cranmorelodge[.]co[.]uk - GET /aU0o0/
 - 173.175.250[.]244 port 443 - 173.175[.]250.244:443 - GET /
 - 181.142.74[.]233 port 80 - 181.142.74[.]233 - GET /
 - 186.71.61[.]91 port 80 - 186.71.61[.]91 - GET /
 - 50.19.229[.]252 port 80 - api.ipify[.]org - GET / (IP address check caused by Trickbot)
 - 85.9.212[.]117 port 443 - SSL/TLS traffic caused by Trickbot
 - 109.234.35[.]101 port 447 - SSL/TLS traffic caused by Trickbot
 - 158.58.131[.]54 port 443 - SSL/TLS traffic caused by Trickbot
 - 37.230.114[.]206 port 447 - SSL/TLS traffic caused by Trickbot
 - 188.124.167[.]132 port 8082 - 188.124.167[.]132:8082 - POST /mon1/[string with Trickbot-infected host info]
 - 74.141.205[.]116 port 443 - attempted TCP connections, but no response from the server
 - 71.202.205[.]235 port 80 - 71.202.205[.]235 - GET /whoami.php
 - 71.202.205[.]235 port 80 - 71.202.205[.]235 - POST /
 
TRAFFIC FROM AN INFECTED WINDOWS HOST (EMOTET + ZEUS PANDA BANKER):
- 72.55.167[.]110 port 80 - weliketomoveit[.]ca - GET /default/EN_en/Address-Update/
 - 144.208.71[.]103 port 80 - fundacionafanic[.]com - GET /TsZLHoZU
 - 144.208.71[.]103 port 80 - fundacionafanic[.]com - GET /TsZLHoZU/
 - 173.175.250[.]244 port 443 - 173.175.250[.]244:443 - GET /
 - 181.142.74[.]233 port 80 - 181.142.74[.]233 - GET /
 - 186.71.61[.]91 port 80 - 186.71.61[.]91 - GET /
 - 74.141.205[.]116 port 443 - attempted TCP connections, but no response from the server
 - 71.202.205[.]235 port 80 - 71.202.205[.]235 - GET /whoami.php
 - 71.202.205[.]235 port 80 - 71.202.205[.]235 - POST /
 - 186.71.61[.]91 port 80 - 186.71.61[.]91 - GET /
 - 185.216.35[.]22 port 443 - humoronoff[.]top - HTTPS/SSL/TLS traffic caused by Zeus Panda Banker
 
MALWARE
SHA256 HASHES FOR THE INITIAL WORD DOCUMENTS:
- 84e0cff85d83a1b143026811ff2963411f7d91f54520a6a5ac9e2dce47d0c97f
 - db8419615c36095c6d01676af677a983827a52ed6d2d42335308b3cfc5c7b7ea
 - dec66f17d2a766f0eba273d27f53155a81818a28425318a07055ae79f94337f9
 - e82e999ee89cb83818e29fece183fe8649671e8bfad1e042d347fed827177765
 
SHA256 HASHES FOR THE FOLLOW-UP EMOTET MALWARE:
- 10810ac39fa23e7e64330b95724cd649040729705b9fbeba03064fb81ab6346a
 - e0295b10fb3dd50e67a54d05ebd20e6b5367d47c5e4baf3cacddb24845fd570b
 - e28f181c92cb68931972ec0b7c61b3fe54ba76d12c5cd251777bde6f9f01ce09
 
SHA256 HASH FOR TRICKBOT CAUSED BY EMOTET INFECTION (GTAG: MON1):
- 3dc3fa64dd957bfe083203a98e6a7af8494bf5de444428ad6fa2da55b9891436
 
SHA256 HASH FOR ZEUS PANDA BANKER CAUSED BY EMOTET INFECTION:
- 20f4445b40dc0cd1830dee6031a7342284e51dc4c399d331507b28f74ba0727b
 
Click here to return to the main page.
