Emotet Botnets Resume Malware Campaigns

emotet thumb

In case you're unfamiliar, let me introduce you to our long-time antagonist since 2014, Emotet.

Emotet is a modular banking Trojan that relies on heavy obfuscation and evasion techniques聽while committing financial theft. The Trojan spreads itself throughout the network by making use of its worm spreader module and brute forcing attacks within the network.

The primary聽method Emotet uses to reach its target is malspam - emails containing malicious attachments or links. These emails often use familiar branding,聽previously scraped conversations or commonly spoofing someone in the same company.

We observed small volumes of Emotet malspam earlier in the week, perhaps testing. However, today聽we noticed Emotet's three unique botnets ramp up operations. They're known for distributing聽extremely large amounts of malspam utilizing these botnets. Their malspam campaigns聽had gone dormant since early February. Latest updates include聽a WiFi spreader module, which聽you can read about聽.

Emotet Sample
Emotet Sample

One of the many variants that we've observed聽today hides聽the payload URL in the HTML of the message. The link prompts the download of聽a malicious rich text format (.rtf)聽file.

You can see that they're spoofing sbcglobal.net in an attempt to appear legitimate. This domain is very commonly spoofed and one聽that聽bad actors have had success with in the past.

In this example they look to be spoofing the City of Liberty, Texas. The link points to a .doc file download.

In this example they look to be spoofing the City of Liberty, Texas. The link points to a .doc file download.

Another variant of this ongoing campaign with a directly attached聽malicious .doc file

Another variant of this ongoing campaign with a directly attached malicious .doc file

Here they are spoofing an excavating business, nobody is off limits with this threat group.

All of the samples we've聽investigated so far are using the same template. These threat actors are claiming the file was created on an iOS device and聽you must "Enable Edition"聽or "Enable Content" to view the supposed content of the file. If you select "Enable Editing"聽or "Enable Content", the macros will run and execute the infection process.

emote file image

Mitigation Tactics

  1. The best thing you can do is to disable macros for your company, the easiest way to accomplish this is through Group Policy聽(a feature of Microsoft Windows Active Directory that adds additional controls to user and computer accounts). Reach out to your IT/Helpdesk team to see if this is an option or has already been done.
  2. User education has never been more important, malicious actors are constantly innovating聽and pivoting, users need to be on their game and know what to look for and what not to click on. Establish an easy process in your company where users can submit anything suspicious聽to your IT/Helpdesk team for review.
  3. Defense in depth is something that your company should constantly strive for. A great start would be by signing up for our Advanced Email Security!

Indicators Of Compromise

cleardristi[.]com
elnasr-co[.]com
fivestarcleanerstx[.]com
crm.shaayanpharma[.]com
zazabajouk[.]com
swingcommerce[.]com
177.144.135[.]2
109.117.53[.]230:443

Obfuscated Powershell Script

powershell script

Base 64 Decoded Powershell Script

base 64 decoded script

Contact us today for a聽free trial of our Email Threat Protection