Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. Emotet

Emotet

Emotet is a modular malware variant which is primarily used as a downloader for other malware variants such asTrickBot andIcedID. Emotet first emerged in June 2014, initially targeting the financial sector, and has expanded to multiple verticals over time.[1]

ID: S0367
Associated Software: Geodo
Type: MALWARE
Platforms: Windows
Contributors: Omkar Gudhate
Version: 1.7
Created: 25 March 2019
Last Modified: 25 November 2024

Associated Software Descriptions

NameDescription
Geodo

[2]

Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1134.001Access Token Manipulation:Token Impersonation/Theft

Emotet has the ability to duplicate the user’s token.[3] For example,Emotet may use a variant of Google’s ProtoBuf to send messages that specify how code will be executed.[4]

EnterpriseT1087.003Account Discovery:Email Account

Emotet has been observed leveraging a module that can scrape email addresses from Outlook.[5][6][3]

EnterpriseT1071.001Application Layer Protocol:Web Protocols

Emotet has used HTTP for command and control.[3]

EnterpriseT1547.001Boot or Logon Autostart Execution:Registry Run Keys / Startup Folder

Emotet has been observed adding the downloaded payload to theHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run key to maintain persistence.[7][8][9]

EnterpriseT1110.001Brute Force:Password Guessing

Emotet has been observed using a hard coded list of passwords to brute force user accounts.[10][7][8][11][5][3]

EnterpriseT1059.001Command and Scripting Interpreter:PowerShell

Emotet has used Powershell to retrieve the malicious payload and download additional resources likeMimikatz.[7][2][9][12][13]

.003Command and Scripting Interpreter:Windows Command Shell

Emotet has used cmd.exe to run a PowerShell script.[9]

.005Command and Scripting Interpreter:Visual Basic

Emotet has sent Microsoft Word documents with embedded macros that will invoke scripts to download additional payloads.[7][14][2][9][13]

EnterpriseT1543.003Create or Modify System Process:Windows Service

Emotet has been observed creating new services to maintain persistence.[8][11][3]

EnterpriseT1555.003Credentials from Password Stores:Credentials from Web Browsers

Emotet has been observed dropping browser password grabber modules.[2][6]

EnterpriseT1132.001Data Encoding:Standard Encoding

Emotet has used Google’s Protobufs to serialize data sent to and from the C2 server.[3] Additionally,Emotet has used Base64 to encode data before sending to the C2 server.[15]

EnterpriseT1140Deobfuscate/Decode Files or Information

Emotet has used a self-extracting RAR file to deliver modules to victims. Emotet has also extracted embedded executables from files using hard-coded buffer offsets.[3]

EnterpriseT1114Email Collection

Emotet has been observed leveraging a module that can scrape email addresses from Outlook.[5][6][3]

.001Local Email Collection

Emotet has been observed leveraging a module that scrapes email data from Outlook.[5]

EnterpriseT1573Encrypted Channel

Emotet has encrypted data before sending to the C2 server.[15]

.001Symmetric Cryptography

Emotet is known to use RSA keys for encrypting C2 traffic.[2]

EnterpriseT1041Exfiltration Over C2 Channel

Emotet has exfiltrated data over its C2 channel.[2][3]

EnterpriseT1210Exploitation of Remote Services

Emotet has been seen exploiting SMB via a vulnerability exploit like EternalBlue (MS17-010) to achieve lateral movement and propagation.[7][8][11][12]

EnterpriseT1105Ingress Tool Transfer

Emotet can download follow-on payloads and items via maliciousurl parameters in obfuscated PowerShell code.[16]

EnterpriseT1570Lateral Tool Transfer

Emotet has copied itself to remote systems using theservice.exe filename.[3]

EnterpriseT1036.004Masquerading:Masquerade Task or Service

Emotet has installed itself as a new service with the service nameWindows Defender System Service and display nameWinDefService.[3]

EnterpriseT1106Native API

Emotet has usedCreateProcess to create a new process to run its executable andWNetEnumResourceW to enumerate non-hidden shares.[3]

EnterpriseT1135Network Share Discovery

Emotet has enumerated non-hidden network shares usingWNetEnumResourceW.[3]

EnterpriseT1040Network Sniffing

Emotet has been observed to hook network APIs to monitor network traffic.[1]

EnterpriseT1571Non-Standard Port

Emotet has used HTTP over ports such as 20, 22, 443, 7080, and 50000, in addition to using ports commonly associated with HTTP/S.[14][3]

EnterpriseT1027.001Obfuscated Files or Information:Binary Padding

Emotet inflates malicious files and malware as an evasion technique.[17]

.002Obfuscated Files or Information:Software Packing

Emotet has used custom packers to protect its payloads.[2]

.009Obfuscated Files or Information:Embedded Payloads

Emotet has dropped an embedded executable at%Temp%\setup.exe.[3] Additionally,Emotet may embed entire code into other files.[4]

.010Obfuscated Files or Information:Command Obfuscation

Emotet has obfuscated macros within malicious documents to hide the URLs hosting the malware, CMD.exe arguments, and PowerShell scripts.[14][2][9][18]

.013Obfuscated Files or Information:Encrypted/Encoded File

Emotet uses obfuscated URLs to download a ZIP file.[17]

EnterpriseT1003.001OS Credential Dumping:LSASS Memory

Emotet has been observed dropping and executing password grabber modules includingMimikatz.[2][4]

EnterpriseT1566.001Phishing:Spearphishing Attachment

Emotet has been delivered by phishing emails containing attachments.[19][10][7][8][14][2][9][13][6]

.002Phishing:Spearphishing Link

Emotet has been delivered by phishing emails containing links.[1][20][19][10][7][8][14][14][9]

EnterpriseT1057Process Discovery

Emotet has been observed enumerating local processes.[21]

EnterpriseT1055.001Process Injection:Dynamic-link Library Injection

Emotet has been observed injecting in to Explorer.exe and other processes.[9][1][8]

.012Process Injection:Process Hollowing

Emotet uses a copy ofcertutil.exe stored in a temporary directory for process hollowing, starting the program in a suspended state before loading malicious code.[17]

EnterpriseT1620Reflective Code Loading

Emotet has reflectively loaded payloads into memory.[3]

EnterpriseT1021.002Remote Services:SMB/Windows Admin Shares

Emotet has leveraged the Admin$, C$, and IPC$ shares for lateral movement.[10][3]

EnterpriseT1053.005Scheduled Task/Job:Scheduled Task

Emotet has maintained persistence through a scheduled task, e.g. though a .dll file in the Registry.[8][4]

EnterpriseT1218.010System Binary Proxy Execution:Regsvr32

Emotet uses RegSvr32 to execute the DLL payload.[17]

EnterpriseT1016.002System Network Configuration Discovery:Wi-Fi Discovery

Emotet can extract names of all locally reachable Wi-Fi networks and then perform a brute-force attack to spread to new networks.[3]

EnterpriseT1033System Owner/User Discovery

Emotet has enumerated all users connected to network shares.

EnterpriseT1552.001Unsecured Credentials:Credentials In Files

Emotet has been observed leveraging a module that retrieves passwords stored on a system for the current logged-on user.[8][5]

EnterpriseT1204.001User Execution:Malicious Link

Emotet has relied upon users clicking on a malicious link delivered through spearphishing.[1][13]

.002User Execution:Malicious File

Emotet has relied upon users clicking on a malicious attachment delivered through spearphishing.[1][13][6]

EnterpriseT1078.003Valid Accounts:Local Accounts

Emotet can brute force a local admin password, then use it to facilitate lateral movement.[10]

EnterpriseT1047Windows Management Instrumentation

Emotet has used WMI to execute powershell.exe.[13]

Groups That Use This Software

References

  1. Salvio, J.. (2014, June 27). New Banking Malware Uses Network Sniffing for Data Theft. Retrieved March 25, 2019.
  2. Trend Micro. (2019, January 16). Exploring Emotet's Activities . Retrieved March 25, 2019.
  3. Binary Defense. (n.d.). Emotet Evolves With new Wi-Fi Spreader. Retrieved September 8, 2023.
  4. Office of Information Security, Health Sector Cybersecurity Coordination Center. (2023, November 16). Emotet Malware: The Enduring and Persistent Threat to the Health Sector. Retrieved June 19, 2024.
  5. CIS. (2018, December 12). MS-ISAC Security Primer- Emotet. Retrieved March 25, 2019.
  6. Kessem, L., et al. (2017, November 13). New Banking Trojan IcedID Discovered by IBM X-Force Research. Retrieved July 14, 2020.
  7. Symantec. (2018, July 18). The Evolution of Emotet: From Banking Trojan to Threat Distributor. Retrieved March 25, 2019.
  8. US-CERT. (2018, July 20). Alert (TA18-201A) Emotet Malware. Retrieved March 25, 2019.
  9. Özarslan, S. (2018, December 21). The Christmas Card you never wanted - A new wave of Emotet is back to wreak havoc. Retrieved March 25, 2019.
  10. Smith, A.. (2017, December 22). Protect your network from Emotet Trojan with Malwarebytes Endpoint Security. Retrieved January 17, 2019.
  11. Mclellan, M.. (2018, November 19). Lazy Passwords Become Rocket Fuel for Emotet SMB Spreader. Retrieved March 25, 2019.
  12. Donohue, B.. (2019, February 13). https://redcanary.com/blog/stopping-emotet-before-it-moves-laterally/. Retrieved March 25, 2019.
  1. Lee, S.. (2019, April 24). Emotet Using WMI to Launch PowerShell Encoded Code. Retrieved May 24, 2019.
  2. Brumaghin, E.. (2019, January 15). Emotet re-emerges after the holidays. Retrieved March 25, 2019.
  3. Xiaopeng Zhang. (2017, May 3). Deep Analysis of New Emotet Variant – Part 1. Retrieved April 1, 2019.
  4. Süleyman Özarslan, PhD; Pincus Security Inc.. (2020, July 14). An Analysis of Emotet Malware: PowerShell Unobfuscation. Retrieved November 25, 2024.
  5. Kenefick, I. (2023, March 13). Emotet Returns, Now Adopts Binary Padding for Evasion. Retrieved June 19, 2024.
  6. Perez, D.. (2018, December 28). Analysis of the latest Emotet propagation campaign. Retrieved April 16, 2019.
  7. CIS. (2017, April 28). Emotet Changes TTPs and Arrives in United States. Retrieved January 17, 2019.
  8. Shulmin, A. . (2015, April 9). The Banking Trojan Emotet: Detailed Analysis. Retrieved March 25, 2019.
  9. ASEC. (2017). ASEC REPORT VOL.88. Retrieved April 16, 2019.
  10. John, E. and Carvey, H. (2019, May 30). Unraveling the Spiderweb: Timelining ATT&CK Artifacts Used by GRIM SPIDER. Retrieved May 12, 2020.
  11. Sean Gallagher, Peter Mackenzie, Elida Leite, Syed Shahram, Bill Kearney, Anand Aijan, Sivagnanam Gn, Suraj Mundalik. (2020, October 14). They’re back: inside a new Ryuk ransomware attack. Retrieved October 14, 2020.
×

[8]ページ先頭

©2009-2026 Movatter.jp