A quick abstract of what occurred with Emotet since its comeback in November 2021
Emotet is a malware household energetic since 2014, operated by a cybercrime group often called Mealybug or TA542. Though it began as a banking trojan, it later developed right into a botnet that grew to become one of the prevalent threats worldwide. Emotet spreads through spam emails; it may exfiltrate data from, and ship third-party malware to, compromised computer systems. Emotet operators will not be very choosy about their targets, putting in their malware on techniques belonging to people in addition to firms and larger organizations.
In January 2021, Emotet was the goal of a takedown because of a world, collaborative effort of eight nations coordinated by Eurojust and Europol. Nonetheless, regardless of this operation, Emotet got here again to life in November 2021.
- Emotet launched a number of spam campaigns because it re-appeared after its takedown.
- Since then, Mealybug created a number of new modules and a number of occasions up to date and improved all present modules.
- Emotet operators subsequently have put quite a lot of effort into avoiding monitoring and monitoring of the botnet because it got here again.
- Presently Emotet is silent and inactive, most likely because of failing to search out an efficient, new assault vector.
Spam campaigns
After the comeback adopted by a number of spam campaigns on the finish of 2021, the start of 2022 continued with these tendencies and we registered a number of spam campaigns launched by Emotet operators. Throughout this time Emotet was spreading primarily through malicious Microsoft Phrase and Microsoft Excel paperwork with embedded VBA macros.
In July 2022, Microsoft modified the sport for all of the malware households like Emotet and Qbot – which had used phishing emails with malicious doc as the strategy of spreading – by disabling VBA macros in paperwork obtained from the Web. This alteration was announced by Microsoft initially of the 12 months and deployed initially in early April, however the replace was rolled again because of person suggestions. The ultimate rollout got here on the finish of July 2022 and, as might be seen in Determine 2, the replace resulted in a big drop in Emotet compromises; we didn’t observe any vital exercise through the summer time of 2022.
Disabling Emotet’s foremost assault vector made its operators search for new methods to compromise their targets. Mealybug started experimenting with malicious LNK and XLL recordsdata, however when the 12 months 2022 was ending, Emotet operators struggled to discover a new assault vector that might be as efficient as VBA macros had been. In 2023, they ran three distinctive malspam campaigns, every testing a barely totally different intrusion avenue and social engineering method. Nonetheless, the shrinking measurement of the assaults and fixed adjustments within the strategy could recommend dissatisfaction with the outcomes.
The primary of these three campaigns occurred round March 8th, 2023, when the Emotet botnet began distributing Phrase paperwork, masked as invoices, with embedded malicious VBA macros. This was fairly odd as a result of VBA macros have been disabled by Microsoft by default, so victims couldn’t run embedded malicious code.
Of their second marketing campaign between March 13th and March 18th, the attackers seemingly acknowledged these flaws, and aside from utilizing the reply chain strategy, additionally they switched from VBA macros to OneNote recordsdata (ONE) with embedded VBScripts. If the victims opened the file, they have been greeted by what appeared like a protected OneNote web page, asking them to click on a View button to see the content material. Behind this graphic ingredient was a hidden VBScript, set to obtain the Emotet DLL.
Regardless of a OneNote warning that this motion would possibly result in malicious content material, individuals are likely to click on at comparable prompts by behavior and thus can doubtlessly enable the attackers to compromise their gadgets.
The final marketing campaign noticed in ESET telemetry was launched on March 20th, making the most of the upcoming revenue tax due date in the USA. The malicious emails despatched by the botnet pretended to return from the US tax workplace Inner Income Service (IRS) and carried an hooked up archive file named W-9 type.zip. The included ZIP file contained a Phrase doc with an embedded malicious VBA macro that the supposed sufferer in all probability needed to enable. Aside from this marketing campaign, focused particularly to the USA, we additionally noticed one other marketing campaign utilizing embedded VBScripts and OneNote strategy that was underway on the identical time.
As might be seen in Determine 3, many of the assaults detected by ESET have been geared toward Japan (43%), Italy (13%), though these numbers could also be biased by the sturdy ESET person base in these areas. After eradicating these prime two nations (with a purpose to deal with the remainder of the world), in Determine 4 it may be seen that the remainder of the world was additionally hit, with Spain (5%) in third place adopted by Mexico (5%) and South Africa (4%).
Enhanced safety and obfuscations
After its reappearance, Emotet acquired a number of upgrades. The primary notable characteristic is that the botnet switched its cryptographic scheme. Earlier than the takedown, Emotet used RSA as their main uneven scheme and after the reappearance, the botnet began to make use of Elliptic curve cryptography. Presently each Downloader module (additionally referred to as Principal module) comes with two embedded public keys. One is used for the Elliptic curve Diffie Hellman key change protocol and the opposite is used for a signature verification – Digital signature algorithm.
Aside from updating Emotet malware to 64-bit structure, Mealybug has additionally applied a number of new obfuscations to guard their modules. First notable obfuscation is management stream flattening which might considerably decelerate evaluation and finding fascinating components of code in Emotet’s modules.
Mealybug additionally applied and improved its implementation of many randomization strategies, of which probably the most notable are the randomization of order of construction members and the randomization of directions that calculate constants (constants are masked).
Yet one more replace that’s value mentioning occurred over the past quarter of 2022, when modules began utilizing timer queues. With these, the principle perform of modules and the communication a part of modules have been set as a callback perform, which is invoked by a number of threads and all of that is mixed with the management stream flattening, the place the state worth that manages which block of code is to be invoked is shared among the many threads. This obfuscation provides as much as one other impediment in evaluation and makes following of the execution stream much more troublesome.
New modules
To stay worthwhile and prevalent malware, Mealybug applied a number of new modules, proven in yellow in Determine 5. A few of them have been created as a defensive mechanism for the botnet, others for extra environment friendly spreading of the malware, and final however not least, a module that steals data that can be utilized to steal the sufferer’s cash.

Determine 5. Emotet’s most continuously used modules. Crimson existed earlier than the takedown; yellow appeared after the comeback
Thunderbird E mail Stealer and Thunderbird Contact Stealer
Emotet is unfold through spam emails and folks typically belief these emails, as a result of Emotet efficiently makes use of an e-mail thread hijacking method. Earlier than the takedown, Emotet used modules we name Outlook Contact Stealer and Outlook E mail Stealer, that have been able to stealing emails and speak to data from Outlook. However as a result of not everybody makes use of Outlook, after the takedown Emotet targeted additionally on a free various e-mail software – Thunderbird.
Emotet could deploy a Thunderbird E mail Stealer module to the compromised laptop, which (because the title suggests) is able to stealing emails. The module searches by means of the Thunderbird recordsdata containing acquired messages (in MBOX format) and steals knowledge from a number of fields together with sender, recipients, topic, date, and contents of the message. All stolen data is then despatched to a C&C server for additional processing.
Along with Thunderbird E mail Stealer, Emotet additionally deploys a Thunderbird Contact Stealer, which is able to stealing contact data from Thunderbird. This module additionally searches by means of the Thunderbird recordsdata, this time searching for each acquired and despatched messages. The distinction is that this module simply extracts data from the From:, To:, CC: and Cc: fields and creates an inner graph of who communicated with whom, the place nodes are individuals, and there’s an edge between two individuals in the event that they communicated with one another. Within the subsequent step, the module orders the stolen contacts – beginning with probably the most interconnected individuals – and sends this data to a C&C server.
All this effort is complemented by two extra modules (that existed already earlier than the takedown) – the MailPassView Stealer module and the Spammer module. MailPassView Stealer abuses a legit NirSoft instrument for password restoration and steals credentials from e-mail purposes. When stolen emails, credentials, and details about who’s in touch with whom will get processed, Mealybug creates malicious emails that appear to be a reply to beforehand stolen conversations and sends these emails along with the stolen credentials to a Spammer module that makes use of these credentials to ship malicious replies to earlier e-mail conversations through SMTP.
Google Chrome Credit score Card Stealer
Because the title suggests, Google Chrome Credit score Card Stealer steals details about bank cards saved within the Google Chrome browser. To realize this, the module makes use of a statically linked SQLite3 library for accessing the Net Information database file often positioned in %LOCALAPPDATApercentGoogleChromeUser DataDefaultWeb Information. The module queries the desk credit_cards for name_of_card, expiration_month, expiration_year, and card_number_encrypted, containing details about bank cards saved within the default Google Chrome profile. Within the final step, the card_number_encrypted worth is decrypted utilizing the important thing saved within the %LOCALAPPDATApercentGoogleChromeUser DataLocal State file and all data is distributed to a C&C server.
Systeminfo and Hardwareinfo modules
Shortly after the return of Emotet, in November 2021 a brand new module we name Systeminfo appeared. This module collects details about a compromised system and sends it to the C&C server. Info collected consists of:
- Output of the systeminfo command
- Output of the ipconfig /all command
- Output of the nltest /dclist: command (eliminated in Oct. 2022)
- Course of listing
- Uptime (obtained through GetTickCount) in seconds (eliminated in Oct 2022)
In October 2022 Emotet’s operators launched one other new module we name Hardwareinfo. Although it doesn’t steal completely details about the {hardware} of a compromised machine, it serves as a complementary supply of knowledge to the Systeminfo module. This module collects the next knowledge from the compromised machine:
- Pc title
- Username
- OS model data, together with main and minor model numbers
- Session ID
- CPU model string
- Details about RAM measurement and utilization
Each modules have one main objective – confirm whether or not the communication comes from legitimately compromised sufferer or not. Emotet was, particularly after its comeback, a very scorching matter within the laptop safety trade and amongst researchers, so Mealybug went to nice lengths to guard themselves from monitoring and monitoring of their actions. Because of the knowledge collected by these two modules that not solely acquire knowledge, but additionally include anti-tracking and anti-analysis methods, Mealybug’s capabilities to inform aside actual victims from malware researchers’ actions or sandboxes have been considerably improved.
What’s subsequent?
In accordance with ESET analysis and telemetry, each Epochs of the botnet have been quiet because the starting of the April 2023. Presently it stays unclear if that is one more trip time for the authors, in the event that they battle to search out new efficient an infection vector, or if there’s somebody new working the botnet.
Although we can’t affirm the rumors that one or each Epochs of the botnet have been bought to someone in January 2023, we seen an uncommon exercise on one of many Epochs. The most recent replace of the downloader module contained a brand new performance, which logs the interior states of the module and tracks its execution to a file C:JSmithLoader (Determine 6, Determine 7). As a result of this file needs to be present to really log one thing, this performance seems to be like a debugging output for somebody who doesn’t fully perceive what the module does and the way it works. Moreover, at the moment the botnet was additionally broadly spreading Spammer modules, that are thought-about to be extra valuable for Mealybug as a result of traditionally they used these modules solely on machines that have been thought-about by them to be secure.
Whichever clarification of why the botnet is quiet now’s true, Emotet has been identified for its effectiveness and its operators made an effort to rebuild and keep the botnet and even add some enhancements, so preserve observe with our weblog to see what the longer term will deliver us.
ESET Analysis provides personal APT intelligence experiences and knowledge feeds. For any inquiries about this service, go to the ESET Threat Intelligence web page.
IoCs
Information
SHA-1 | Filename | ESET detection title | Description |
---|---|---|---|
D5FDE4A0DF9E416DE02AE51D07EFA8D7B99B11F2 | N/A | Win64/Emotet.AL | Emotet Systeminfo module. |
1B6CFE35EF42EB9C6E19BCBD5A3829458C856DBC | N/A | Win64/Emotet.AL | Emotet Hardwareinfo module. |
D938849F4C9D7892CD1558C8EDA634DADFAD2F5A | N/A | Win64/Emotet.AO | Emotet Google Chrome Credit score Card Stealer module. |
1DF4561C73BD35E30B31EEE62554DD7157AA26F2 | N/A | Win64/Emotet.AL | Emotet Thunderbird E mail Stealer module. |
05EEB597B3A0F0C7A9E2E24867A797DF053AD860 | N/A | Win64/Emotet.AL | Emotet Thunderbird Contact Stealer module. |
0CEB10940CE40D1C26FC117BC2D599C491657AEB | N/A | Win64/Emotet.AQ | Emotet Downloader module, model with timer queue obfuscation. |
8852B81566E8331ED43AB3C5648F8D13012C8A3B | N/A | Win64/Emotet.AL | Emotet Downloader module, x64 model. |
F2E79EC201160912AB48849A5B5558343000042E | N/A | Win64/Emotet.AQ | Emotet Downloader module, model with debug strings. |
CECC5BBA6193D744837E689E68BC25C43EDA7235 | N/A | Win32/Emotet.DG | Emotet Downloader module, x86 model. |
Community
IP | Area | Internet hosting supplier | First seen | Particulars |
---|---|---|---|---|
1.234.2[.]232 | N/A | SK Broadband Co Ltd | N/A | N/A |
1.234.21[.]73 | N/A | SK Broadband Co Ltd | N/A | N/A |
5.9.116[.]246 | N/A | Hetzner On-line GmbH | N/A | N/A |
5.135.159[.]50 | N/A | OVH SAS | N/A | N/A |
27.254.65[.]114 | N/A | CS LOXINFO Public Firm Restricted. | N/A | N/A |
37.44.244[.]177 | N/A | Hostinger Worldwide Restricted | N/A | N/A |
37.59.209[.]141 | N/A | Abuse-C Function | N/A | N/A |
37.187.115[.]122 | N/A | OVH SAS | N/A | N/A |
45.71.195[.]104 | N/A | NET ALTERNATIVA PROVEDOR DE INTERNET LTDA – ME | N/A | N/A |
45.79.80[.]198 | N/A | Linode | N/A | N/A |
45.118.115[.]99 | N/A | Asep Bambang Gunawan | N/A | N/A |
45.176.232[.]124 | N/A | CABLE Y TELECOMUNICACIONES DE COLOMBIA S.A.S (CABLETELCO) | N/A | N/A |
45.235.8[.]30 | N/A | WIKINET TELECOMUNICAÇÕES | N/A | N/A |
46.55.222[.]11 | N/A | DCC | N/A | N/A |
51.91.76[.]89 | N/A | OVH SAS | N/A | N/A |
51.161.73[.]194 | N/A | OVH SAS | N/A | N/A |
51.254.140[.]238 | N/A | Abuse-C Function | N/A | N/A |
54.37.106[.]167 | N/A | OVH SAS | N/A | N/A |
54.37.228[.]122 | N/A | OVH SAS | N/A | N/A |
54.38.242[.]185 | N/A | OVH SAS | N/A | N/A |
59.148.253[.]194 | N/A | CTINETS HOSTMASTER | N/A | N/A |
61.7.231[.]226 | N/A | IP-network CAT Telecom | N/A | N/A |
61.7.231[.]229 | N/A | The Communication Authoity of Thailand, CAT | N/A | N/A |
62.171.178[.]147 | N/A | Contabo GmbH | N/A | N/A |
66.42.57[.]149 | N/A | The Fixed Firm, LLC | N/A | N/A |
66.228.32[.]31 | N/A | Linode | N/A | N/A |
68.183.93[.]250 | N/A | DigitalOcean, LLC | N/A | N/A |
72.15.201[.]15 | N/A | Flexential Colorado Corp. | N/A | N/A |
78.46.73[.]125 | N/A | Hetzner On-line GmbH – Contact Function, ORG-HOA1-RIPE | N/A | N/A |
78.47.204[.]80 | N/A | Hetzner On-line GmbH | N/A | N/A |
79.137.35[.]198 | N/A | OVH SAS | N/A | N/A |
82.165.152[.]127 | N/A | 1&1 IONOS SE | N/A | N/A |
82.223.21[.]224 | N/A | IONOS SE | N/A | N/A |
85.214.67[.]203 | N/A | Strato AG | N/A | N/A |
87.106.97[.]83 | N/A | IONOS SE | N/A | N/A |
91.121.146[.]47 | N/A | OVH SAS | N/A | N/A |
91.207.28[.]33 | N/A | Optima Telecom Ltd. | N/A | N/A |
93.104.209[.]107 | N/A | MNET | N/A | N/A |
94.23.45[.]86 | N/A | OVH SAS | N/A | N/A |
95.217.221[.]146 | N/A | Hetzner On-line GmbH | N/A | N/A |
101.50.0[.]91 | N/A | PT. Beon Intermedia | N/A | N/A |
103.41.204[.]169 | N/A | PT Infinys System Indonesia | N/A | N/A |
103.43.75[.]120 | N/A | Choopa LLC administrator | N/A | N/A |
103.63.109[.]9 | N/A | Nguyen Nhu Thanh | N/A | N/A |
103.70.28[.]102 | N/A | Nguyen Thi Oanh | N/A | N/A |
103.75.201[.]2 | N/A | IRT-CDNPLUSCOLTD-TH | N/A | N/A |
103.132.242[.]26 | N/A | Ishan’s Community | N/A | N/A |
104.131.62[.]48 | N/A | DigitalOcean, LLC | N/A | N/A |
104.168.155[.]143 | N/A | Hostwinds LLC. | N/A | N/A |
104.248.155[.]133 | N/A | DigitalOcean, LLC | N/A | N/A |
107.170.39[.]149 | N/A | DigitalOcean, LLC | N/A | N/A |
110.232.117[.]186 | N/A | RackCorp | N/A | N/A |
115.68.227[.]76 | N/A | SMILESERV | N/A | N/A |
116.124.128[.]206 | N/A | IRT-KRNIC-KR | N/A | N/A |
116.125.120[.]88 | N/A | IRT-KRNIC-KR | N/A | N/A |
118.98.72[.]86 | N/A | PT Telkom Indonesia APNIC Sources Administration | N/A | N/A |
119.59.103[.]152 | N/A | 453 Ladplacout Jorakhaebua | N/A | N/A |
119.193.124[.]41 | N/A | IP Supervisor | N/A | N/A |
128.199.24[.]148 | N/A | DigitalOcean, LLC | N/A | N/A |
128.199.93[.]156 | N/A | DigitalOcean, LLC | N/A | N/A |
128.199.192[.]135 | N/A | DigitalOcean, LLC | N/A | N/A |
129.232.188[.]93 | N/A | Xneelo (Pty) Ltd | N/A | N/A |
131.100.24[.]231 | N/A | EVEO S.A. | N/A | N/A |
134.122.66[.]193 | N/A | DigitalOcean, LLC | N/A | N/A |
139.59.56[.]73 | N/A | DigitalOcean, LLC | N/A | N/A |
139.59.126[.]41 | N/A | Digital Ocean Inc administrator | N/A | N/A |
139.196.72[.]155 | N/A | Hangzhou Alibaba Promoting Co.,Ltd. | N/A | N/A |
142.93.76[.]76 | N/A | DigitalOcean, LLC | N/A | N/A |
146.59.151[.]250 | N/A | OVH SAS | N/A | N/A |
146.59.226[.]45 | N/A | OVH SAS | N/A | N/A |
147.139.166[.]154 | N/A | Alibaba (US) Know-how Co., Ltd. | N/A | N/A |
149.56.131[.]28 | N/A | OVH SAS | N/A | N/A |
150.95.66[.]124 | N/A | GMO Web Inc administrator | N/A | N/A |
151.106.112[.]196 | N/A | Hostinger Worldwide Restricted | N/A | N/A |
153.92.5[.]27 | N/A | Hostinger Worldwide Restricted | N/A | N/A |
153.126.146[.]25 | N/A | IRT-JPNIC-JP | N/A | N/A |
159.65.3[.]147 | N/A | DigitalOcean, LLC | N/A | N/A |
159.65.88[.]10 | N/A | DigitalOcean, LLC | N/A | N/A |
159.65.140[.]115 | N/A | DigitalOcean, LLC | N/A | N/A |
159.69.237[.]188 | N/A | Hetzner On-line GmbH – Contact Function, ORG-HOA1-RIPE | N/A | N/A |
159.89.202[.]34 | N/A | DigitalOcean, LLC | N/A | N/A |
160.16.142[.]56 | N/A | IRT-JPNIC-JP | N/A | N/A |
162.243.103[.]246 | N/A | DigitalOcean, LLC | N/A | N/A |
163.44.196[.]120 | N/A | GMO-Z com NetDesign Holdings Co., Ltd. | N/A | N/A |
164.68.99[.]3 | N/A | Contabo GmbH | N/A | N/A |
164.90.222[.]65 | N/A | DigitalOcean, LLC | N/A | N/A |
165.22.230[.]183 | N/A | DigitalOcean, LLC | N/A | N/A |
165.22.246[.]219 | N/A | DigitalOcean, LLC | N/A | N/A |
165.227.153[.]100 | N/A | DigitalOcean, LLC | N/A | N/A |
165.227.166[.]238 | N/A | DigitalOcean, LLC | N/A | N/A |
165.227.211[.]222 | N/A | DigitalOcean, LLC | N/A | N/A |
167.172.199[.]165 | N/A | DigitalOcean, LLC | N/A | N/A |
167.172.248[.]70 | N/A | DigitalOcean, LLC | N/A | N/A |
167.172.253[.]162 | N/A | DigitalOcean, LLC | N/A | N/A |
168.197.250[.]14 | N/A | Omar Anselmo Ripoll (TDC NET) | N/A | N/A |
169.57.156[.]166 | N/A | SoftLayer | N/A | N/A |
172.104.251[.]154 | N/A | Akamai Linked Cloud | N/A | N/A |
172.105.226[.]75 | N/A | Akamai Linked Cloud | N/A | N/A |
173.212.193[.]249 | N/A | Contabo GmbH | N/A | N/A |
182.162.143[.]56 | N/A | IRT-KRNIC-KR | N/A | N/A |
183.111.227[.]137 | N/A | Korea Telecom | N/A | N/A |
185.4.135[.]165 | N/A | ENARTIA Single Member S.A. | N/A | N/A |
185.148.168[.]15 | N/A | Abuse-C Function | N/A | N/A |
185.148.168[.]220 | N/A | Abuse-C Function | N/A | N/A |
185.168.130[.]138 | N/A | GigaCloud NOC | N/A | N/A |
185.184.25[.]78 | N/A | MUV Bilisim ve Telekomunikasyon Hizmetleri Ltd. Sti. | N/A | N/A |
185.244.166[.]137 | N/A | Jan Philipp Waldecker buying and selling as LUMASERV Programs | N/A | N/A |
186.194.240[.]217 | N/A | SEMPRE TELECOMUNICACOES LTDA | N/A | N/A |
187.63.160[.]88 | N/A | BITCOM PROVEDOR DE SERVICOS DE INTERNET LTDA | N/A | N/A |
188.44.20[.]25 | N/A | Firm for communications providers A1 Makedonija DOOEL Skopje | N/A | N/A |
190.90.233[.]66 | N/A | INTERNEXA Brasil Operadora de Telecomunicações S.A | N/A | N/A |
191.252.103[.]16 | N/A | Locaweb Serviços de Web S/A | N/A | N/A |
194.9.172[.]107 | N/A | Abuse-C Function | N/A | N/A |
195.77.239[.]39 | N/A | TELEFONICA DE ESPANA S.A.U. | N/A | N/A |
195.154.146[.]35 | N/A | Scaleway Abuse, ORG-ONLI1-RIPE | N/A | N/A |
196.218.30[.]83 | N/A | TE Information Contact Function | N/A | N/A |
197.242.150[.]244 | N/A | Afrihost (Pty) Ltd | N/A | N/A |
198.199.65[.]189 | N/A | DigitalOcean, LLC | N/A | N/A |
198.199.98[.]78 | N/A | DigitalOcean, LLC | N/A | N/A |
201.94.166[.]162 | N/A | Claro NXT Telecomunicacoes Ltda | N/A | N/A |
202.129.205[.]3 | N/A | NIPA TECHNOLOGY CO., LTD | N/A | N/A |
203.114.109[.]124 | N/A | IRT-TOT-TH | N/A | N/A |
203.153.216[.]46 | N/A | Iswadi Iswadi | N/A | N/A |
206.189.28[.]199 | N/A | DigitalOcean, LLC | N/A | N/A |
207.148.81[.]119 | N/A | The Fixed Firm, LLC | N/A | N/A |
207.180.241[.]186 | N/A | Contabo GmbH | N/A | N/A |
209.97.163[.]214 | N/A | DigitalOcean, LLC | N/A | N/A |
209.126.98[.]206 | N/A | GoDaddy.com, LLC | N/A | N/A |
210.57.209[.]142 | N/A | Andri Tamtrijanto | N/A | N/A |
212.24.98[.]99 | N/A | Interneto vizija | N/A | N/A |
213.239.212[.]5 | N/A | Hetzner On-line GmbH | N/A | N/A |
213.241.20[.]155 | N/A | Netia Telekom S.A. Contact Function | N/A | N/A |
217.182.143[.]207 | N/A | OVH SAS | N/A | N/A |
MITRE ATT&CK strategies
This desk was constructed utilizing version 12 of the MITRE ATT&CK enterprise strategies.
Tactic | ID | Identify | Description |
---|---|---|---|
Reconnaissance | T1592.001 | Collect Sufferer Host Info: {Hardware} | Emotet gathers details about {hardware} of the compromised machine, resembling CPU model string. |
T1592.004 | Collect Sufferer Host Info: Shopper Configurations | Emotet gathers details about system configuration such because the ipconfig /all and systeminfo instructions. | |
T1592.002 | Collect Sufferer Host Info: Software program | Emotet exfiltrates an inventory of working processes. | |
T1589.001 | Collect Sufferer Identification Info: Credentials | Emotet deploys modules which can be in a position to steal credentials from browsers and e-mail purposes. | |
T1589.002 | Collect Sufferer Identification Info: E mail Addresses | Emotet deploys modules that may extract e-mail addresses from e-mail purposes. | |
Useful resource Improvement | T1586.002 | Compromise Accounts: E mail Accounts | Emotet compromises e-mail accounts and makes use of them for spreading malspam emails. |
T1584.005 | Compromise Infrastructure: Botnet | Emotet compromises quite a few third-party techniques to type a botnet. | |
T1587.001 | Develop Capabilities: Malware | Emotet consists of a number of distinctive malware modules and elements. | |
T1588.002 | Acquire Capabilities: Software | Emotet makes use of NirSoft instruments to steal credentials from contaminated machines. | |
Preliminary Entry | T1566 | Phishing | Emotet sends phishing emails with malicious attachments. |
T1566.001 | Phishing: Spearphishing Attachment | Emotet sends spearphishing emails with malicious attachments. | |
Execution | T1059.005 | Command and Scripting Interpreter: Visible Primary | Emotet has been seen utilizing Microsoft Phrase paperwork containing malicious VBA macros. |
T1204.002 | Person Execution: Malicious File | Emotet has been counting on customers opening malicious e-mail attachments and executing embedded scripts. | |
Protection Evasion | T1140 | Deobfuscate/Decode Information or Info | Emotet modules use encrypted strings and masked checksums of API perform names. |
T1027.002 | Obfuscated Information or Info: Software program Packing | Emotet makes use of customized packers to guard their payloads. | |
T1027.007 | Obfuscated Information or Info: Dynamic API Decision | Emotet resolves API calls at runtime. | |
Credential Entry | T1555.003 | Credentials from Password Shops: Credentials from Net Browsers | Emotet acquires credentials saved in internet browsers by abusing NirSoft’s WebBrowserPassView software. |
T1555 | Credentials from Password Shops | Emotet is able to stealing passwords from e-mail purposes by abusing NirSoft’s MailPassView software. | |
Assortment | T1114.001 | E mail Assortment: Native E mail Assortment | Emotet steals emails from Outlook and Thunderbird purposes. |
Command and Management | T1071.003 | Utility Layer Protocol: Mail Protocols | Emotet can ship malicious emails through SMTP. |
T1573.002 | Encrypted Channel: Uneven Cryptography | Emotet is utilizing ECDH keys to encrypt C&C site visitors. | |
T1573.001 | Encrypted Channel: Symmetric Cryptography | Emotet is utilizing AES to encrypt C&C site visitors. | |
T1571 | Non-Normal Port | Emotet is thought to speak on nonstandard ports resembling 7080. |