| Name | Description |
|---|---|
| Geodo |
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1134 | .001 | Access Token Manipulation:Token Impersonation/Theft | Emotet has the ability to duplicate the user’s token.[3] For example,Emotet may use a variant of Google’s ProtoBuf to send messages that specify how code will be executed.[4] |
| Enterprise | T1087 | .003 | Account Discovery:Email Account | Emotet has been observed leveraging a module that can scrape email addresses from Outlook.[5][6][3] |
| Enterprise | T1071 | .001 | Application Layer Protocol:Web Protocols | |
| Enterprise | T1547 | .001 | Boot or Logon Autostart Execution:Registry Run Keys / Startup Folder | Emotet has been observed adding the downloaded payload to the |
| Enterprise | T1110 | .001 | Brute Force:Password Guessing | Emotet has been observed using a hard coded list of passwords to brute force user accounts.[10][7][8][11][5][3] |
| Enterprise | T1059 | .001 | Command and Scripting Interpreter:PowerShell | Emotet has used Powershell to retrieve the malicious payload and download additional resources likeMimikatz.[7][2][9][12][13] |
| .003 | Command and Scripting Interpreter:Windows Command Shell | |||
| .005 | Command and Scripting Interpreter:Visual Basic | Emotet has sent Microsoft Word documents with embedded macros that will invoke scripts to download additional payloads.[7][14][2][9][13] | ||
| Enterprise | T1543 | .003 | Create or Modify System Process:Windows Service | Emotet has been observed creating new services to maintain persistence.[8][11][3] |
| Enterprise | T1555 | .003 | Credentials from Password Stores:Credentials from Web Browsers | Emotet has been observed dropping browser password grabber modules.[2][6] |
| Enterprise | T1132 | .001 | Data Encoding:Standard Encoding | Emotet has used Google’s Protobufs to serialize data sent to and from the C2 server.[3] Additionally,Emotet has used Base64 to encode data before sending to the C2 server.[15] |
| Enterprise | T1140 | Deobfuscate/Decode Files or Information | Emotet has used a self-extracting RAR file to deliver modules to victims. Emotet has also extracted embedded executables from files using hard-coded buffer offsets.[3] | |
| Enterprise | T1114 | Email Collection | Emotet has been observed leveraging a module that can scrape email addresses from Outlook.[5][6][3] | |
| .001 | Local Email Collection | Emotet has been observed leveraging a module that scrapes email data from Outlook.[5] | ||
| Enterprise | T1573 | Encrypted Channel | Emotet has encrypted data before sending to the C2 server.[15] | |
| .001 | Symmetric Cryptography | Emotet is known to use RSA keys for encrypting C2 traffic.[2] | ||
| Enterprise | T1041 | Exfiltration Over C2 Channel | ||
| Enterprise | T1210 | Exploitation of Remote Services | Emotet has been seen exploiting SMB via a vulnerability exploit like EternalBlue (MS17-010) to achieve lateral movement and propagation.[7][8][11][12] | |
| Enterprise | T1105 | Ingress Tool Transfer | Emotet can download follow-on payloads and items via malicious | |
| Enterprise | T1570 | Lateral Tool Transfer | Emotet has copied itself to remote systems using the | |
| Enterprise | T1036 | .004 | Masquerading:Masquerade Task or Service | Emotet has installed itself as a new service with the service name |
| Enterprise | T1106 | Native API | Emotet has used | |
| Enterprise | T1135 | Network Share Discovery | Emotet has enumerated non-hidden network shares using | |
| Enterprise | T1040 | Network Sniffing | Emotet has been observed to hook network APIs to monitor network traffic.[1] | |
| Enterprise | T1571 | Non-Standard Port | Emotet has used HTTP over ports such as 20, 22, 443, 7080, and 50000, in addition to using ports commonly associated with HTTP/S.[14][3] | |
| Enterprise | T1027 | .001 | Obfuscated Files or Information:Binary Padding | Emotet inflates malicious files and malware as an evasion technique.[17] |
| .002 | Obfuscated Files or Information:Software Packing | |||
| .009 | Obfuscated Files or Information:Embedded Payloads | Emotet has dropped an embedded executable at | ||
| .010 | Obfuscated Files or Information:Command Obfuscation | Emotet has obfuscated macros within malicious documents to hide the URLs hosting the malware, CMD.exe arguments, and PowerShell scripts.[14][2][9][18] | ||
| .013 | Obfuscated Files or Information:Encrypted/Encoded File | |||
| Enterprise | T1003 | .001 | OS Credential Dumping:LSASS Memory | Emotet has been observed dropping and executing password grabber modules includingMimikatz.[2][4] |
| Enterprise | T1566 | .001 | Phishing:Spearphishing Attachment | Emotet has been delivered by phishing emails containing attachments.[19][10][7][8][14][2][9][13][6] |
| .002 | Phishing:Spearphishing Link | Emotet has been delivered by phishing emails containing links.[1][20][19][10][7][8][14][14][9] | ||
| Enterprise | T1057 | Process Discovery | ||
| Enterprise | T1055 | .001 | Process Injection:Dynamic-link Library Injection | Emotet has been observed injecting in to Explorer.exe and other processes.[9][1][8] |
| .012 | Process Injection:Process Hollowing | Emotet uses a copy of | ||
| Enterprise | T1620 | Reflective Code Loading | ||
| Enterprise | T1021 | .002 | Remote Services:SMB/Windows Admin Shares | Emotet has leveraged the Admin$, C$, and IPC$ shares for lateral movement.[10][3] |
| Enterprise | T1053 | .005 | Scheduled Task/Job:Scheduled Task | Emotet has maintained persistence through a scheduled task, e.g. though a .dll file in the Registry.[8][4] |
| Enterprise | T1218 | .010 | System Binary Proxy Execution:Regsvr32 | |
| Enterprise | T1016 | .002 | System Network Configuration Discovery:Wi-Fi Discovery | Emotet can extract names of all locally reachable Wi-Fi networks and then perform a brute-force attack to spread to new networks.[3] |
| Enterprise | T1033 | System Owner/User Discovery | Emotet has enumerated all users connected to network shares. | |
| Enterprise | T1552 | .001 | Unsecured Credentials:Credentials In Files | Emotet has been observed leveraging a module that retrieves passwords stored on a system for the current logged-on user.[8][5] |
| Enterprise | T1204 | .001 | User Execution:Malicious Link | Emotet has relied upon users clicking on a malicious link delivered through spearphishing.[1][13] |
| .002 | User Execution:Malicious File | Emotet has relied upon users clicking on a malicious attachment delivered through spearphishing.[1][13][6] | ||
| Enterprise | T1078 | .003 | Valid Accounts:Local Accounts | Emotet can brute force a local admin password, then use it to facilitate lateral movement.[10] |
| Enterprise | T1047 | Windows Management Instrumentation | ||
| ID | Name | References |
|---|---|---|
| G0102 | Wizard Spider |