All You Need to Know About Emotet in 2022

For
6
months,
the
infamous
Emotet
botnet
has
shown
almost
no
activity,
and
now
it’s
distributing
malicious
spam.
Let’s
dive
into
details
and
discuss
all
you
need
to
know
about
the
notorious
malware
to
combat
it.

Why
is
everyone
scared
of
Emotet?


Emotet

is
by
far
one
of
the
most
dangerous
trojans
ever
created.
The
malware
became
a
very
destructive
program
as
it
grew
in
scale
and
sophistication.
The
victim
can
be
anyone
from
corporate
to
private
users
exposed
to
spam
email
campaigns.

The
botnet
distributes
through
phishing
containing
malicious
Excel
or
Word
documents.
When
users
open
these
documents
and
enable
macros,
the
Emotet
DLL
downloads
and
then
loads
into
memory.

It
searches
for
email
addresses
and
steals
them
for
spam
campaigns.
Moreover,
the
botnet
drops
additional
payloads,
such
as
Cobalt
Strike
or
other
attacks
that
lead
to
ransomware.

The
polymorphic
nature
of
Emotet,
along
with
the
many
modules
it
includes,
makes
the
malware
challenging
to
identify.
The
Emotet
team
constantly
changes
its
tactics,
techniques,
and
procedures
to
ensure
that
the
existing
detection
rules
cannot
be
applied.
As
part
of
its
strategy
to
stay
invisible
in
the
infected
system,
the
malicious
software
downloads
extra
payloads
using
multiple
steps.

And
the
results
of
Emotet
behavior
are
devastating
for
cybersecurity
specialists:
the
malware
is
nearly
impossible
to
remove.
It
spreads
quickly,
generates
faulty
indicators,
and
adapts
according
to
attackers’
needs.

How
has
Emotet
upgraded
over
the
years?

Emotet
is
an
advanced
and
constantly
changing
modular
botnet.
The
malware
started
its
journey
as
a
simple
banking
trojan
in
2014.
But
since
then,
it
has
acquired
a
bunch
of
different
features,
modules,
and
campaigns:

  • 2014.
    Money
    transfer,
    mail
    spam,
    DDoS,
    and
    address
    book
    stealing
    modules.
  • 2015.
    Evasion
    functionality.
  • 2016.
    Mail
    spam,
    RIG
    4.0
    exploit
    kit,
    delivery
    of
    other
    trojans.
  • 2017.
    A
    spreader
    and
    address
    book
    stealer
    module.
  • 2021.
    XLS
    malicious
    templates,
    uses
    MSHTA,
    dropped
    by
    Cobalt
    Strike.
  • 2022.
    Some
    features
    remained
    the
    same,
    but
    this
    year
    also
    brought
    several
    updates.

This
tendency
proves
that
Emotet
isn’t
going
anywhere
despite
frequent “vacations”
and
even
the
official
shutdown.
The
malware
evolves
fast
and
adapts
to
everything.

What
features
has
a
new
Emotet
2022
version
acquired?

After
almost
half
a
year
of
a
break,
the
Emotet
botnet
returned
even
stronger.
Here
is
what
you
need
to
know
about
a
new
2022
version:

  • It
    drops
    IcedID,
    a
    modular
    banking
    trojan.
  • The
    malware
    loads
    XMRig,
    a
    miner
    that
    steals
    wallet
    data.
  • The
    trojan
    has
    binary
    changes.
  • Emotet
    bypasses
    detection
    using
    a
    64-bit
    code
    base.
  • A
    new
    version
    uses
    new
    commands:

Invoke
rundll32.exe
with
a
random
named
DLL
and
the
export
PluginInit

  • Emotet’s
    goal
    is
    to
    get
    credentials
    from
    Google
    Chrome
    and
    other
    browsers.
  • It’s
    also
    targeted
    to
    make
    use
    of
    the
    SMB
    protocol
    to
    collect
    company
    data
  • Like
    six
    months
    ago,
    the
    botnet
    uses
    XLS
    malicious
    lures,
    but
    it
    adopted
    a
    new
    one
    this
    time:

The
Emotet’s
Excel
lure

How
to
detect
Emotet?

The
main
Emotet
challenge
is
to
detect
it
in
the
system
quickly
and
accurately.
Besides
that,
a
malware
analyst
should
understand
the
botnet’s
behavior
to
prevent
future
attacks
and
avoid
possible
losses.

With
its
long
story
of
development,
Emotet
stepped
up
in
the
anti-evasion
strategy.
Through
the
evolution
of
the
process
execution
chain
and
malware
activity
inside
the
infected
system
changes,
the
malware
has
modified
detection
techniques
drastically.

For
example,
in
2018,
it
was
possible
to
detect
this
banker
by
looking
at
the
name
of
the
process

it
was
one
of
these:

eventswrap,
implrandom,
turnedavatar,
soundser,
archivesymbol,
wabmetagen,
msrasteps,
secmsi,
crsdcard,
narrowpurchase,
smxsel,
watchvsgd,
mfidlisvc,
searchatsd,
lpiograd,
noticesman,
appxmware,
sansidaho

Later,
in
the
first
quarter
of
2020,
Emotet
started
to
create
specific
key
into
the
registry

it
writes
into
the
key
HKEY_CURRENT_USER\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER
value
with
the
length
8
symbols
(letters
and
characters).

Of
course,
Suricata
rules
always
identify
this
malware,
but
detection
systems
often
continue
beyond
the
first
wave
because
rules
need
to
update.

Another
way
to
detect
this
banker
was
its
malicious
documents

crooks
use
specific
templates
and
lures,
even
with
grammatical
errors
in
them.
One
of
the
most
reliable
ways
to
detect
Emotet
is
by
the
YARA
rules.

To
overcome
malware’s
anti-evasion
techniques
and
capture
the
botnet

use
a
malware
sandbox
as
the
most
convenient
tool
for
this
goal.
In

ANY.RUN
,
you
can
not
only
detect,
monitor,
and
analyze
malicious
objects
but
also
get
already
extracted
configurations
from
the
sample.

There
are
some
features
that
you
use
just
for
Emotet
analysis:

  • reveal
    C2
    links
    of
    a
    malicious
    sample
    with
    the
    FakeNet
  • use
    Suricata
    and
    YARA
    rulesets
    to
    successfully
    identify
    the
    botnet
  • Get
    data
    about
    C2
    servers,
    keys,
    and
    strings
    extracted
    from
    the
    sample’s
    memory
    dump
  • gather
    fresh
    malware’s
    IOCs

The
tool
helps
to
perform
successful
investigations
quickly
and
precisely,
so
malware
analysts
can
save
valuable
time.

ANY.RUN
sandbox
has
prepared
incredible
deals
for

Black
Friday
2022
!
Now
is
the
best
time
to
boost
your
malware
analysis
and
save
some
money!
Check
out

special
offers

for
their
premium
plans
but
for
a
limited
time

from
22-29
November,
2022.

Emotet
has
not
demonstrated
full
functionality
and
consistent
follow-on
payload
delivery.
Use
modern
tools
like
ANY.RUN
online
malware
sandbox
to
improve
your
cybersecurity
and
detect
this
botnet
effectively.
Stay
safe
and
good
threat
hunting!

Leave a Reply

Your email address will not be published. Required fields are marked *