HomeSample Page

Sample Page Title


Emotet is a malware household lively since 2014, operated by a cybercrime group often called Mealybug or TA542. Though it began as a banking trojan, it later developed right into a botnet that turned some of the prevalent threats worldwide. Emotet spreads through spam emails; it will probably exfiltrate info from, and ship third-party malware to, compromised computer systems. Emotet operators aren’t very choosy about their targets, putting in their malware on methods belonging to people in addition to firms and greater organizations.

In January 2021, Emotet was the goal of a takedown because of a global, collaborative effort of eight international locations coordinated by Eurojust and Europol. Nonetheless, regardless of this operation, Emotet got here again to life in November 2021.

Key factors of this blogpost:

  • Emotet launched a number of spam campaigns because it re-appeared after its takedown.
  • Since then, Mealybug created a number of new modules and a number of occasions up to date and improved all present modules.
  • Emotet operators subsequently have put numerous effort into avoiding monitoring and monitoring of the botnet because it got here again.
  • Presently Emotet is silent and inactive, most likely resulting from failing to seek out an efficient, new assault vector.

Determine 1. Timeline of fascinating Emotet occasions since its return

Spam campaigns

After the comeback adopted by a number of spam campaigns on the finish of 2021, the start of 2022 continued with these traits and we registered a number of spam campaigns launched by Emotet operators. Throughout this time Emotet was spreading primarily through malicious Microsoft Phrase and Microsoft Excel paperwork with embedded VBA macros.

In July 2022, Microsoft modified the sport for all of the malware households like Emotet and Qbot – which had used phishing emails with malicious doc as the tactic of spreading – by disabling VBA macros in paperwork obtained from the Web. This variation was introduced by Microsoft initially of the yr and deployed initially in early April, however the replace was rolled again resulting from consumer suggestions. The ultimate rollout got here on the finish of July 2022 and, as will be seen in Determine 2, the replace resulted in a major drop in Emotet compromises; we didn’t observe any important exercise throughout the summer season of 2022.

Determine 2. Emotet detection pattern, seven-day transferring common

Disabling Emotet’s fundamental assault vector made its operators search for new methods to compromise their targets. Mealybug began experimenting with malicious LNK and XLL information, however when the yr 2022 was ending, Emotet operators struggled to discover a new assault vector that might be as efficient as VBA macros had been. In 2023, they ran three distinctive malspam campaigns, every testing a barely totally different intrusion avenue and social engineering approach. Nonetheless, the shrinking dimension of the assaults and fixed modifications within the strategy might counsel dissatisfaction with the outcomes.

The primary of these three campaigns occurred round March 8th, 2023, when the Emotet botnet began distributing Phrase paperwork, masked as invoices, with embedded malicious VBA macros. This was fairly odd as a result of VBA macros had been disabled by Microsoft by default, so victims couldn’t run embedded malicious code.

Of their second marketing campaign between March 13th and March 18th, the attackers seemingly acknowledged these flaws, and aside from utilizing the reply chain strategy, in addition they switched from VBA macros to OneNote information (ONE) with embedded VBScripts. If the victims opened the file, they had been greeted by what regarded like a protected OneNote web page, asking them to click on a View button to see the content material. Behind this graphic ingredient was a hidden VBScript, set to obtain the Emotet DLL.

Regardless of a OneNote warning that this motion may result in malicious content material, folks are inclined to click on at comparable prompts by behavior and thus can probably permit the attackers to compromise their units.

The final marketing campaign noticed in ESET telemetry was launched on March 20th, benefiting from the upcoming earnings tax due date in the US. The malicious emails despatched by the botnet pretended to return from the US tax workplace Inner Income Service (IRS) and carried an hooked up archive file named W-9 kind.zip. The included ZIP file contained a Phrase doc with an embedded malicious VBA macro that the meant sufferer most likely needed to allow. Other than this marketing campaign, focused particularly to the USA, we additionally noticed one other marketing campaign utilizing embedded VBScripts and OneNote strategy that was underway on the identical time.

As will be seen in Determine 3, a lot of the assaults detected by ESET had been aimed toward Japan (43%), Italy (13%), though these numbers could also be biased by the sturdy ESET consumer base in these areas. After eradicating these high two international locations (with the intention to concentrate on the remainder of the world), in Determine 4 it may be seen that the remainder of the world was additionally hit, with Spain (5%) in third place adopted by Mexico (5%) and South Africa (4%).

Determine 3. Emotet detections Jan 2022 – Jun 2023

Determine 4. Emotet detections Jan 2022 – Jun 2023 (JP and IT excluded)

Enhanced safety and obfuscations

After its reappearance, Emotet acquired a number of upgrades. The primary notable function is that the botnet switched its cryptographic scheme. Earlier than the takedown, Emotet used RSA as their main uneven scheme and after the reappearance, the botnet began to make use of Elliptic curve cryptography. Presently each Downloader module (additionally known as Fundamental module) comes with two embedded public keys. One is used for the Elliptic curve Diffie Hellman key change protocol and the opposite is used for a signature verification – Digital signature algorithm.

Other than updating Emotet malware to 64-bit structure, Mealybug has additionally applied a number of new obfuscations to guard their modules. First notable obfuscation is management movement flattening which might considerably decelerate evaluation and finding fascinating components of code in Emotet’s modules.

Mealybug additionally applied and improved its implementation of many randomization methods, of which probably the most notable are the randomization of order of construction members and the randomization of directions that calculate constants (constants are masked).

Yet another replace that’s value mentioning occurred over the past quarter of 2022, when modules began utilizing timer queues. With these, the primary perform of modules and the communication a part of modules had been set as a callback perform, which is invoked by a number of threads and all of that is mixed with the management movement flattening, the place the state worth that manages which block of code is to be invoked is shared among the many threads. This obfuscation provides as much as one other impediment in evaluation and makes following of the execution movement much more tough.

New modules

To stay worthwhile and prevalent malware, Mealybug applied a number of new modules, proven in yellow in Determine 5. A few of them had been created as a defensive mechanism for the botnet, others for extra environment friendly spreading of the malware, and final however not least, a module that steals info that can be utilized to steal the sufferer’s cash.

Determine 5. Emotet’s most ceaselessly used modules. Crimson existed earlier than the takedown; yellow appeared after the comeback

Thunderbird E mail Stealer and Thunderbird Contact Stealer

Emotet is unfold through spam emails and folks usually belief these emails, as a result of Emotet efficiently makes use of an e mail thread hijacking approach. Earlier than the takedown, Emotet used modules we name Outlook Contact Stealer and Outlook E mail Stealer, that had been able to stealing emails and make contact with info from Outlook. However as a result of not everybody makes use of Outlook, after the takedown Emotet targeted additionally on a free different e mail software – Thunderbird.

Emotet might deploy a Thunderbird E mail Stealer module to the compromised pc, which (because the title suggests) is able to stealing emails. The module searches via the Thunderbird information containing obtained messages (in MBOX format) and steals knowledge from a number of fields together with sender, recipients, topic, date, and contents of the message.  All stolen info is then despatched to a C&C server for additional processing.

Along with Thunderbird E mail Stealer, Emotet additionally deploys a Thunderbird Contact Stealer, which is able to stealing contact info from Thunderbird. This module additionally searches via the Thunderbird information, this time on the lookout for each obtained and despatched messages. The distinction is that this module simply extracts info from the From:, To:, CC: and Cc: fields and creates an inside graph of who communicated with whom, the place nodes are folks, and there’s an edge between two folks in the event that they communicated with one another. Within the subsequent step, the module orders the stolen contacts – beginning with probably the most interconnected folks – and sends this info to a C&C server.

All this effort is complemented by two further modules (that existed already earlier than the takedown) – the MailPassView Stealer module and the Spammer module. MailPassView Stealer abuses a official NirSoft instrument for password restoration and steals credentials from e mail functions. When stolen emails, credentials, and details about who’s in touch with whom will get processed, Mealybug creates malicious emails that appear to be a reply to beforehand stolen conversations and sends these emails along with the stolen credentials to a Spammer module that makes use of these credentials to ship malicious replies to earlier e mail conversations through SMTP.

Google Chrome Credit score Card Stealer

Because the title suggests, Google Chrome Credit score Card Stealer steals details about bank cards saved within the Google Chrome browser. To attain this, the module makes use of a statically linked SQLite3 library for accessing the Net Knowledge database file normally situated in %LOCALAPPDATApercentGoogleChromeUser DataDefaultWeb Knowledge. The module queries the desk credit_cards for name_of_card, expiration_month, expiration_year, and card_number_encrypted, containing details about bank cards saved within the default Google Chrome profile. Within the final step, the card_number_encrypted worth is decrypted utilizing the important thing saved within the %LOCALAPPDATApercentGoogleChromeUser DataLocal State file and all info is shipped to a C&C server.

Systeminfo and Hardwareinfo modules

Shortly after the return of Emotet, in November 2021 a brand new module we name Systeminfo appeared. This module collects details about a compromised system and sends it to the C&C server. Data collected consists of:

  • Output of the systeminfo command
  • Output of the ipconfig /all command
  • Output of the nltest /dclist: command (eliminated in Oct. 2022)
  • Course of record
  • Uptime (obtained through GetTickCount) in seconds (eliminated in Oct 2022)

In October 2022 Emotet’s operators launched one other new module we name Hardwareinfo. Although it doesn’t steal solely details about the {hardware} of a compromised machine, it serves as a complementary supply of data to the Systeminfo module. This module collects the next knowledge from the compromised machine:

  • Pc title
  • Username
  • OS model info, together with main and minor model numbers
  • Session ID
  • CPU model string
  • Details about RAM dimension and utilization

Each modules have one main objective – confirm whether or not the communication comes from legitimately compromised sufferer or not. Emotet was, particularly after its comeback, a extremely sizzling matter within the pc safety business and amongst researchers, so Mealybug went to nice lengths to guard themselves from monitoring and monitoring of their actions. Due to the data collected by these two modules that not solely accumulate knowledge, but in addition include anti-tracking and anti-analysis methods, Mealybug’s capabilities to inform aside actual victims from malware researchers’ actions or sandboxes had been considerably improved.

What’s subsequent?

In line with ESET analysis and telemetry, each Epochs of the botnet have been quiet for the reason that starting of the April 2023. Presently it stays unclear if that is one more trip time for the authors, in the event that they wrestle to seek out new efficient an infection vector, or if there’s somebody new working the botnet.

Although we can not verify the rumors that one or each Epochs of the botnet had been offered to any individual in January 2023, we seen an uncommon exercise on one of many Epochs. The most recent replace of the downloader module contained a brand new performance, which logs the internal states of the module and tracks its execution to a file C:JSmithLoader (Determine 6, Determine 7). As a result of this file needs to be present to truly log one thing, this performance seems like a debugging output for somebody who doesn’t utterly perceive what the module does and the way it works. Moreover, at the moment the botnet was additionally broadly spreading Spammer modules, that are thought-about to be extra treasured for Mealybug as a result of traditionally they used these modules solely on machines that had been thought-about by them to be protected.

Determine 6. Logging of conduct of the downloader module

Determine 7. Logging of conduct of the downloader module

Whichever rationalization of why the botnet is quiet now could be true, Emotet has been recognized for its effectiveness and its operators made an effort to rebuild and keep the botnet and even add some enhancements, so preserve monitor with our weblog to see what the long run will carry us.

For any inquiries about our analysis revealed on WeLiveSecurity, please contact us at threatintel@eset.com.
ESET Analysis affords non-public APT intelligence studies and knowledge feeds. For any inquiries about this service, go to the ESET Risk Intelligence web page.

IoCs

Recordsdata

SHA-1FilenameESET detection titleDescription
D5FDE4A0DF9E416DE02AE51D07EFA8D7B99B11F2N/AWin64/Emotet.ALEmotet Systeminfo module.
1B6CFE35EF42EB9C6E19BCBD5A3829458C856DBCN/AWin64/Emotet.ALEmotet Hardwareinfo module.
D938849F4C9D7892CD1558C8EDA634DADFAD2F5AN/AWin64/Emotet.AOEmotet Google Chrome Credit score Card Stealer module.
1DF4561C73BD35E30B31EEE62554DD7157AA26F2N/AWin64/Emotet.ALEmotet Thunderbird E mail Stealer module.
05EEB597B3A0F0C7A9E2E24867A797DF053AD860N/AWin64/Emotet.ALEmotet Thunderbird Contact Stealer module.
0CEB10940CE40D1C26FC117BC2D599C491657AEBN/AWin64/Emotet.AQEmotet Downloader module, model with timer queue obfuscation.
8852B81566E8331ED43AB3C5648F8D13012C8A3BN/AWin64/Emotet.ALEmotet Downloader module, x64 model.
F2E79EC201160912AB48849A5B5558343000042EN/AWin64/Emotet.AQEmotet Downloader module, model with debug strings.
CECC5BBA6193D744837E689E68BC25C43EDA7235N/AWin32/Emotet.DGEmotet Downloader module, x86 model.

Community

IPAreaInternet hosting supplierFirst seenParticulars
1.234.2[.]232N/ASK Broadband Co LtdN/AN/A
1.234.21[.]73N/ASK Broadband Co LtdN/AN/A
5.9.116[.]246N/AHetzner On-line GmbHN/AN/A
5.135.159[.]50N/AOVH SASN/AN/A
27.254.65[.]114N/ACS LOXINFO Public Firm Restricted.N/AN/A
37.44.244[.]177N/AHostinger Worldwide RestrictedN/AN/A
37.59.209[.]141N/AAbuse-C PositionN/AN/A
37.187.115[.]122N/AOVH SASN/AN/A
45.71.195[.]104N/ANET ALTERNATIVA PROVEDOR DE INTERNET LTDA – MEN/AN/A
45.79.80[.]198N/ALinodeN/AN/A
45.118.115[.]99N/AAsep Bambang GunawanN/AN/A
45.176.232[.]124N/ACABLE Y TELECOMUNICACIONES DE COLOMBIA S.A.S (CABLETELCO)N/AN/A
45.235.8[.]30N/AWIKINET TELECOMUNICAÇÕESN/AN/A
46.55.222[.]11N/ADCCN/AN/A
51.91.76[.]89N/AOVH SASN/AN/A
51.161.73[.]194N/AOVH SASN/AN/A
51.254.140[.]238N/AAbuse-C PositionN/AN/A
54.37.106[.]167N/AOVH SASN/AN/A
54.37.228[.]122N/AOVH SASN/AN/A
54.38.242[.]185N/AOVH SASN/AN/A
59.148.253[.]194N/ACTINETS HOSTMASTERN/AN/A
61.7.231[.]226N/AIP-network CAT TelecomN/AN/A
61.7.231[.]229N/AThe Communication Authoity of Thailand, CATN/AN/A
62.171.178[.]147N/AContabo GmbHN/AN/A
66.42.57[.]149N/AThe Fixed Firm, LLCN/AN/A
66.228.32[.]31N/ALinodeN/AN/A
68.183.93[.]250N/ADigitalOcean, LLCN/AN/A
72.15.201[.]15N/AFlexential Colorado Corp.N/AN/A
78.46.73[.]125N/AHetzner On-line GmbH – Contact Position, ORG-HOA1-RIPEN/AN/A
78.47.204[.]80N/AHetzner On-line GmbHN/AN/A
79.137.35[.]198N/AOVH SASN/AN/A
82.165.152[.]127N/A1&1 IONOS SEN/AN/A
82.223.21[.]224N/AIONOS SEN/AN/A
85.214.67[.]203N/AStrato AGN/AN/A
87.106.97[.]83N/AIONOS SEN/AN/A
91.121.146[.]47N/AOVH SASN/AN/A
91.207.28[.]33N/AOptima Telecom Ltd.N/AN/A
93.104.209[.]107N/AMNETN/AN/A
94.23.45[.]86N/AOVH SASN/AN/A
95.217.221[.]146N/AHetzner On-line GmbHN/AN/A
101.50.0[.]91N/APT. Beon IntermediaN/AN/A
103.41.204[.]169N/APT Infinys System IndonesiaN/AN/A
103.43.75[.]120N/AChoopa LLC administratorN/AN/A
103.63.109[.]9N/ANguyen Nhu ThanhN/AN/A
103.70.28[.]102N/ANguyen Thi OanhN/AN/A
103.75.201[.]2N/AIRT-CDNPLUSCOLTD-THN/AN/A
103.132.242[.]26N/AIshan’s CommunityN/AN/A
104.131.62[.]48N/ADigitalOcean, LLCN/AN/A
104.168.155[.]143N/AHostwinds LLC.N/AN/A
104.248.155[.]133N/ADigitalOcean, LLCN/AN/A
107.170.39[.]149N/ADigitalOcean, LLCN/AN/A
110.232.117[.]186N/ARackCorpN/AN/A
115.68.227[.]76N/ASMILESERVN/AN/A
116.124.128[.]206N/AIRT-KRNIC-KRN/AN/A
116.125.120[.]88N/AIRT-KRNIC-KRN/AN/A
118.98.72[.]86N/APT Telkom Indonesia APNIC Assets AdministrationN/AN/A
119.59.103[.]152N/A453 Ladplacout JorakhaebuaN/AN/A
119.193.124[.]41N/AIP SupervisorN/AN/A
128.199.24[.]148N/ADigitalOcean, LLCN/AN/A
128.199.93[.]156N/ADigitalOcean, LLCN/AN/A
128.199.192[.]135N/ADigitalOcean, LLCN/AN/A
129.232.188[.]93N/AXneelo (Pty) LtdN/AN/A
131.100.24[.]231N/AEVEO S.A.N/AN/A
134.122.66[.]193N/ADigitalOcean, LLCN/AN/A
139.59.56[.]73N/ADigitalOcean, LLCN/AN/A
139.59.126[.]41N/ADigital Ocean Inc administratorN/AN/A
139.196.72[.]155N/AHangzhou Alibaba Promoting Co.,Ltd.N/AN/A
142.93.76[.]76N/ADigitalOcean, LLCN/AN/A
146.59.151[.]250N/AOVH SASN/AN/A
146.59.226[.]45N/AOVH SASN/AN/A
147.139.166[.]154N/AAlibaba (US) Expertise Co., Ltd.N/AN/A
149.56.131[.]28N/AOVH SASN/AN/A
150.95.66[.]124N/AGMO Web Inc administratorN/AN/A
151.106.112[.]196N/AHostinger Worldwide RestrictedN/AN/A
153.92.5[.]27N/AHostinger Worldwide RestrictedN/AN/A
153.126.146[.]25N/AIRT-JPNIC-JPN/AN/A
159.65.3[.]147N/ADigitalOcean, LLCN/AN/A
159.65.88[.]10N/ADigitalOcean, LLCN/AN/A
159.65.140[.]115N/ADigitalOcean, LLCN/AN/A
159.69.237[.]188N/AHetzner On-line GmbH – Contact Position, ORG-HOA1-RIPEN/AN/A
159.89.202[.]34N/ADigitalOcean, LLCN/AN/A
160.16.142[.]56N/AIRT-JPNIC-JPN/AN/A
162.243.103[.]246N/ADigitalOcean, LLCN/AN/A
163.44.196[.]120N/AGMO-Z com NetDesign Holdings Co., Ltd.N/AN/A
164.68.99[.]3N/AContabo GmbHN/AN/A
164.90.222[.]65N/ADigitalOcean, LLCN/AN/A
165.22.230[.]183N/ADigitalOcean, LLCN/AN/A
165.22.246[.]219N/ADigitalOcean, LLCN/AN/A
165.227.153[.]100N/ADigitalOcean, LLCN/AN/A
165.227.166[.]238N/ADigitalOcean, LLCN/AN/A
165.227.211[.]222N/ADigitalOcean, LLCN/AN/A
167.172.199[.]165N/ADigitalOcean, LLCN/AN/A
167.172.248[.]70N/ADigitalOcean, LLCN/AN/A
167.172.253[.]162N/ADigitalOcean, LLCN/AN/A
168.197.250[.]14N/AOmar Anselmo Ripoll (TDC NET)N/AN/A
169.57.156[.]166N/ASoftLayerN/AN/A
172.104.251[.]154N/AAkamai Linked CloudN/AN/A
172.105.226[.]75N/AAkamai Linked CloudN/AN/A
173.212.193[.]249N/AContabo GmbHN/AN/A
182.162.143[.]56N/AIRT-KRNIC-KRN/AN/A
183.111.227[.]137N/AKorea TelecomN/AN/A
185.4.135[.]165N/AENARTIA Single Member S.A.N/AN/A
185.148.168[.]15N/AAbuse-C PositionN/AN/A
185.148.168[.]220N/AAbuse-C PositionN/AN/A
185.168.130[.]138N/AGigaCloud NOCN/AN/A
185.184.25[.]78N/AMUV Bilisim ve Telekomunikasyon Hizmetleri Ltd. Sti.N/AN/A
185.244.166[.]137N/AJan Philipp Waldecker buying and selling as LUMASERV ProgramsN/AN/A
186.194.240[.]217N/ASEMPRE TELECOMUNICACOES LTDAN/AN/A
187.63.160[.]88N/ABITCOM PROVEDOR DE SERVICOS DE INTERNET LTDAN/AN/A
188.44.20[.]25N/AFirm for communications companies A1 Makedonija DOOEL SkopjeN/AN/A
190.90.233[.]66N/AINTERNEXA Brasil Operadora de Telecomunicações S.AN/AN/A
191.252.103[.]16N/ALocaweb Serviços de Web S/AN/AN/A
194.9.172[.]107N/AAbuse-C PositionN/AN/A
195.77.239[.]39N/ATELEFONICA DE ESPANA S.A.U.N/AN/A
195.154.146[.]35N/AScaleway Abuse, ORG-ONLI1-RIPEN/AN/A
196.218.30[.]83N/ATE Knowledge Contact PositionN/AN/A
197.242.150[.]244N/AAfrihost (Pty) LtdN/AN/A
198.199.65[.]189N/ADigitalOcean, LLCN/AN/A
198.199.98[.]78N/ADigitalOcean, LLCN/AN/A
201.94.166[.]162N/AClaro NXT Telecomunicacoes LtdaN/AN/A
202.129.205[.]3N/ANIPA TECHNOLOGY CO., LTDN/AN/A
203.114.109[.]124N/AIRT-TOT-THN/AN/A
203.153.216[.]46N/AIswadi IswadiN/AN/A
206.189.28[.]199N/ADigitalOcean, LLCN/AN/A
207.148.81[.]119N/AThe Fixed Firm, LLCN/AN/A
207.180.241[.]186N/AContabo GmbHN/AN/A
209.97.163[.]214N/ADigitalOcean, LLCN/AN/A
209.126.98[.]206N/AGoDaddy.com, LLCN/AN/A
210.57.209[.]142N/AAndri TamtrijantoN/AN/A
212.24.98[.]99N/AInterneto vizijaN/AN/A
213.239.212[.]5N/AHetzner On-line GmbHN/AN/A
213.241.20[.]155N/ANetia Telekom S.A. Contact PositionN/AN/A
217.182.143[.]207N/AOVH SASN/AN/A

MITRE ATT&CK methods

This desk was constructed utilizing model 12 of the MITRE ATT&CK enterprise methods.

TacticIDIdentifyDescription
ReconnaissanceT1592.001Collect Sufferer Host Data: {Hardware}Emotet gathers details about {hardware} of the compromised machine, resembling CPU model string.
T1592.004Collect Sufferer Host Data: Consumer ConfigurationsEmotet gathers details about system configuration such because the ipconfig /all and systeminfo instructions.
T1592.002Collect Sufferer Host Data: Software programEmotet exfiltrates a listing of working processes.
T1589.001Collect Sufferer Id Data: CredentialsEmotet deploys modules which are in a position to steal credentials from browsers and e mail functions.
T1589.002Collect Sufferer Id Data: E mail AddressesEmotet deploys modules that may extract e mail addresses from e mail functions.
Useful resource GrowthT1586.002Compromise Accounts: E mail AccountsEmotet compromises e mail accounts and makes use of them for spreading malspam emails.
T1584.005Compromise Infrastructure: BotnetEmotet compromises quite a few third-party methods to kind a botnet.
T1587.001Develop Capabilities: MalwareEmotet consists of a number of distinctive malware modules and parts.
T1588.002Get hold of Capabilities: DeviceEmotet makes use of NirSoft instruments to steal credentials from contaminated machines.
Preliminary EntryT1566PhishingEmotet sends phishing emails with malicious attachments.
T1566.001Phishing: Spearphishing AttachmentEmotet sends spearphishing emails with malicious attachments.
ExecutionT1059.005Command and Scripting Interpreter: Visible PrimaryEmotet has been seen utilizing Microsoft Phrase paperwork containing malicious VBA macros.
T1204.002Consumer Execution: Malicious FileEmotet has been counting on customers opening malicious e mail attachments and executing embedded scripts.
Protection EvasionT1140Deobfuscate/Decode Recordsdata or DataEmotet modules use encrypted strings and masked checksums of API perform names.
T1027.002Obfuscated Recordsdata or Data: Software program PackingEmotet makes use of customized packers to guard their payloads.
T1027.007Obfuscated Recordsdata or Data: Dynamic API DecisionEmotet resolves API calls at runtime.
Credential EntryT1555.003Credentials from Password Shops: Credentials from Net BrowsersEmotet acquires credentials saved in internet browsers by abusing NirSoft’s WebBrowserPassView software.
T1555Credentials from Password ShopsEmotet is able to stealing passwords from e mail functions by abusing NirSoft’s MailPassView software.
AssortmentT1114.001E mail Assortment: Native E mail AssortmentEmotet steals emails from Outlook and Thunderbird functions.
Command and ManagementT1071.003Software Layer Protocol: Mail ProtocolsEmotet can ship malicious emails through SMTP.
T1573.002Encrypted Channel: Uneven CryptographyEmotet is utilizing ECDH keys to encrypt C&C site visitors.
T1573.001Encrypted Channel: Symmetric CryptographyEmotet is utilizing AES to encrypt C&C site visitors.
T1571Non-Customary PortEmotet is understood to speak on nonstandard ports resembling 7080.



Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles