Skip to main content

Emotet C2 Network IOC December 2018 Week 2 Campaign


Article by Vishal Thakur

OTX Feed: https://otx.alienvault.com/pulse/5c1c2c5ce8b7580bde6ade7f/



Ip AddressCountryRegionCityStatus
109.104.79.48United KingdomValid
109.128.252.1BelgiumWalloniaOheyValid
130.209.248.118United KingdomGlasgow CityGlasgowValid
130.209.248.130United KingdomGlasgow CityGlasgowValid
130.209.253.231United KingdomGlasgow CityGlasgowValid
133.242.208.183JapanValid
138.68.139.199United KingdomLondon, City ofLondonValid
144.76.117.247GermanyBayernGunzenhausenValid
152.169.22.153ArgentinaSanta FeRosarioValid
159.65.76.245United StatesCaliforniaSanta ClaraValid
165.227.213.173United StatesNew JerseyCliftonValid
173.212.221.251GermanyValid
178.141.80.155RussiaKirovLomovskayaValid
179.52.155.151Dominican RepublicDistrito NacionalSanta DomingoValid
181.51.214.5ColombiaBogota D.C.BogotáValid
181.57.97.83ColombiaAntioquiaMedellínValid
181.60.57.250ColombiaValid
185.86.148.222SwedenVastra GotalandGothenburgValid
186.101.235.14EcuadorGuayasGuayaquilValid
186.139.184.36ArgentinaBuenos Aires F.D.Buenos AiresValid
186.70.152.218EcuadorValid
188.194.63.4GermanyBavariaRegensburgValid
189.134.53.158MexicoMexico CityMexico CityValid
189.146.217.35MexicoMexico CityMexico CityValid
189.222.20.165MexicoEstado de Baja CaliforniaMexicaliValid
190.106.97.230ArgentinaCordobaCórdobaValid
190.131.157.113EcuadorProvincia de PichinchaQuitoValid
190.180.124.226BoliviaDepartamento de Santa CruzSanta CruzValid
190.193.3.177ArgentinaMisionesPosadasValid
190.195.129.227ArgentinaSanta FeRosarioValid
190.202.39.187VenezuelaValid
190.67.11.122ColombiaAntioquiaMedellínValid
190.79.4.107VenezuelaSucreAltagraciaValid
190.84.160.195ColombiaBogota D.C.BogotáValid
192.155.90.90United StatesNew JerseyNewarkValid
198.61.196.18United StatesTexasSan AntonioValid
210.2.86.72VietnamValid
213.184.244.254BelarusMinsk CityMinskValid
219.94.254.93JapanŌsakaOsakaValid
23.254.203.51United StatesWashingtonSeattleValid
49.212.135.76JapanŌsakaOsakaValid
5.9.128.163GermanyBayernGunzenhausenValid
63.143.67.107JamaicaTrelawnyDuncansValid
78.186.175.183TurkeyKocaeliKosekoyValid
78.61.250.157LithuaniaVilniusVilniusValid
81.145.239.194United KingdomSuffolkIpswichValid
83.110.12.246United Arab EmiratesDubaiDubaiValid
85.99.251.233TurkeyIstanbulIstanbulValid
92.48.118.27United KingdomReadingReadingValid
93.182.25.14RussiaMoscowMoscowValid
94.64.51.64GreeceAtticaAthensValid

Sample: 43FF308DCF98F48EDFAEE4C662641BAA

Comments

Popular posts from this blog

Major update: Emotet C2i Apr 2019

Emotet has updated the C2 comms in the latest release, going for URIs instead of IPs (root). Here’s a complete list of the current campaign: Emotet C2i: http://51.255.50.164:8080/window/child/ringin/ http://109.104.79.48:8080/cookies/tlb/ http://92.48.118.27:8080/rtm/pnp/ http://197.248.67.226:8080/enabled/forced/ http://181.170.93.38:8080/teapot/balloon/ http://69.163.33.82:8080/glitch/scripts/arizona/ http://192.155.90.90:7080/prov/odbc/arizona/ http://43.229.62.186:8080/teapot/ http://72.47.248.48:8080/sess/cone/ http://209.159.244.240:443/publish/vermont/tlb/ http://197.248.67.226:8080/codec/between/tlb/ http://176.58.93.123:8080/splash/ http://72.47.248.48:8080/sess/glitch/entries/ http://181.170.93.38:8080/schema/free/ http://69.163.33.82:8080/badge/symbols/results/ http://109.73.52.242:8080/results/prov/ http://68.191.37.107/iplk/vermont/sym/merge/ http://154.120.228.126:8080/xian/enabled/sym/merge/ http://136.49.87.106/usbccid/taskbar/enabled/ http://5.9.128.163:8080/json

Grinju Downloader: Anti-analysis (on steroids) | Part 2

  This malware takes anti-analysis and stealth techniques to a new level We took a look at this malware in the Part 1 of this publication. Now let’s carry on with the analysis and dig deeper into the various anti-analysis and stealth-exec features of this malware in Part2. Malpedia Inventory: https://malpedia.caad.fkie.fraunhofer.de/details/vbs.grinju Secondary Macro Code First of all, here’s the entire code that is dumped in the sheet once all the macro functions have been completed. Take a look at these lines and try to figure out what they are meant to do. Then we’ll take a look at the most important of these briefly before moving on to the next section. =CLOSE(FALSE) =FORMULA(LEN(APP.MAXIMIZE())+-459,Sheet1!R18690C129) =FORMULA(LEN(GET.WINDOW(7))+-131,Sheet1!R18691C129) =FORMULA(LEN(GET.WINDOW(20))+-893,Sheet1!R18692C129) =FORMULA(LEN(GET.WINDOW(23)=3)+433,Sheet1!R18693C129) =FORMULA(LEN(GET.WORKSPACE(31))+864,Sheet1!R18694C129) =FORMULA(LEN(GET.WORKSPACE(13)>770)+707,Sheet1!R18

Grinju Downloader: Anti-analysis (on steroids) | Part 1

  This malware takes anti-analysis and stealth techniques to a new level Malpedia Inventory: https://malpedia.caad.fkie.fraunhofer.de/details/vbs.grinju I’ve come across some great anti-analysis code in malware over the years. This one takes the top spot. On that note, let’s get into it, this is a long one! Since this malware employs a very complex structure, I’ve decided to divide the analysis into different sections. I’ll try to keep it as simple as possible but having said that, it really is a very complicated project. Hence, publishing in parts. TLDR: This is a very well-thought and equally well-written malware. There’s no VBA that you can analyse. The values and formulas that are used are spread across the worksheets to thousands of rows. The functions, among other things, are used to close the file, corrupt it and also delete the dropped scripts to make analysis extremely hard. In fact, you cannot analyse this malware without altering the code it self. Along the way, you’ll also