Wanted

First designed as a banking trojan, Emotet is a piece of modular malware that spreads through phishing and spear phishing attacks. Once infecting a host, Emotet is primarily used as a downloader for other forms of malware.

Emotet

Wrap Sheet

Basic Threat Type
Botnet, Malware Loader

First Seen
2014

Alliances
Wizard Spider

Origin
Ukraine

Targeted Industries
Banking Sector, Towns and Cities

Notable Attacks
Allentown, PA - February 2018
Heise Online - May 2019
Kammergericht Berlin - September 2019
Humboldt University of Berlin - October 2019
Frankfurt, Germany - December 2019
Emotet
Emotet

Villian Synopsis:

Emotet is a sophisticated piece of modular malware that is primarily used as a downloader for follow-on malware. Emotet spreads through prolific spear phishing and malspam distributed by machines that it has infected. This malspam distributes Microsoft Office files containing a malicious macro which unpacks Emotet. Emotet is highly evasive: generating a new SHA256 hash every time a new machine is infected, ensuring that each malware sample’s hash is unique. Once Emotet infects a host, it establishes an encrypted C2 channel and attempts lateral movement within the network, leveraging the admin$ share once it has brute forced the admin password. Emotet is often unpacked with a hard-coded password dictionary used to brute force user accounts. Once C2 is established, Emotet can be used to download a variety of follow-on malware, most commonly TrickBot or IcedID. Emotet is also known to scrape significant data from the infected host, including Outlook data, local and browser passwords, and information on running processes, in addition to actively sniffing network traffic.

References
https://attack.mitre.org/software/S0367/
https://unit42.paloaltonetworks.com/emotet-malware-summary-epoch-4-5/