Emotet Banker (SAMPLE 2, Malware)

Emotet Banker (SAMPLE 2, Malware)

Table of Contents
    Add a header to begin generating the table of contents

    Signup for all MixMode Threat Research


    Author

    Emotet Banker (SAMPLE 2, Malware)

    Source address: localnet

    Destination address: externalnet (see below for full list)

    Source port: ephemeral

    Destination port: 

    • tcp/449
    • tcp/443
    • tcp/8080
    • tcp/80
    • tcp/8082
    • tcp/7080
    • tcp/447
    • tcp/8443
    • tcp/1900
    • tcp/6771

    Content: GET /wp-admin/verif.myaccount.send.com/ HTTP/1.1\r\n… (among many, many others)

    SAMPLE 2: 2019-03-14-Emotet-with-Trickbot-infection-traffic.pcap

    DESCRIPTION

    The delivery method for this threat is via spearphishing. It uses a ‘word document’ to target unsuspecting victims.

    HTTP/1.1 200 OK
    
    Date: Thu, 14 Mar 2019 20:56:49 GMT
    
    Content-Type: application/msword
    
    Transfer-Encoding: chunked
    
    Connection: keep-alive
    
    Set-Cookie: 5c8ac0117776b=1552597009; expires=Thu, 14-Mar-2019 20:57:49 GMT; Max-Age=60; path=/
    
    Cache-Control: no-cache, must-revalidate
    
    Pragma: no-cache
    
    Last-Modified: Thu, 14 Mar 2019 20:56:49 GMT
    
    Expires: Thu, 14 Mar 2019 20:56:49 GMT
    
    Content-Disposition: attachment; filename="Receipt_201903_927098.doc"
    
    Content-Transfer-Encoding: binary
    
    Server: Nginx
    
    X-Powered-By: VPSSIM
    
    X-Frame-Options: SAMEORIGIN
    
    X-Content-Type-Options: nosniff
    
    X-XSS-Protection: 1; mode=block

    GENERAL NOTES

    The infected doc sets up a trojan that communicates with a very large array of C2 servers. They are geographically disperse, and obviously target financial victims. This dropper reaches out to several servers, a number of which grab an updated executable that installs a lightly-detected piece of ransomware. Emotet has been around since 2018, but it has grown from simply stealing and exfiltrating passwords to a full-featured, complex ransomware campaign.

    MIXMODE ANALYSIS

    Emotet has recently updated itself to a full-blown Ransomware campaign. The latest version, currently active, is caught by MM in a number of dimensions.

    The executables this version of Emotet are downloading now, and the campaign is still live, are part of a Ransomware campaign. The updated executables are being downloaded from hacked WordPress servers located all over the world.

    This version of Emotet uses compromised WordPress websites to host update executable files. This one updates from a WP site located in Quebec, which is almost certainly compromised and not part of the campaign on purpose. In addition to the installation, persistence, and beaconing, MM detects the data exfiltration as well. Several big named security suites fail to detect this campaign, according to VirusTotal.

    If we look closely at the logs, we find the username and password of one of the campaign members, located in Jakarta. A member of this gang goes by the handle tim@pookiedookie.com, and his password is P@ssw0rd123$.

    Geographic Distribution

    Country

    Connection Count

    Brazil

    21648

    n/a

    12591

    United States

    4924

    France

    3445

    Romania

    2583

    Indonesia

    1845

    Colombia

    1601

    Hong Kong

    1599

    Argentina

    1231

    Latvia

    985

    United Kingdom

    984

    Germany

    861

    Mexico

    739

    Japan

    738

    Netherlands

    738

    Russia

    738

    Canada

    615

    Peru

    492

    Ecuador

    246

    India

    246

    Qatar

    246

    Singapore

    246

    IP Address Counts

    IP Address

    Connection Count

    179.189.241.254

    23284

    51.255.50.164

    6336

    103.119.144.250

    4123

    82.78.228.57

    3971

    173.50.48.59

    2656

    112.120.68.71

    1727

    173.248.147.186

    1320

    187.207.188.248

    1188

    190.146.86.180

    1188

    10.3.14.1

    1070

    94.140.125.199

    1064

    66.209.69.165

    793

    138.68.139.199

    792

    144.76.117.247

    792

    188.68.211.212

    792

    190.117.206.153

    792

    219.94.254.93

    792

    91.205.215.57

    792

    181.16.4.180

    660

    181.61.221.146

    660

    192.155.90.90

    660

    192.163.199.254

    660

    50.246.45.249

    660

    139.59.19.157

    528

    178.78.64.80

    528

    186.3.188.74

    528

    190.146.214.85

    528

    190.15.198.47

    528

    35.182.171.82

    528

    50.19.247.198

    399

    190.210.3.93

    396

    45.32.117.41

    396

    181.29.214.233

    264

    186.137.133.132

    264

    23.254.203.51

    264

    5.9.128.163

    264

    70.184.97.144

    264

    70.28.3.120

    264

    71.11.157.249

    264

    72.47.248.48

    264

    89.211.193.18

    264

    Ready to join the next wave of Cybersecurity?

    Stop wasting time and money with outdated threat detection solutions, get a demo of MixMode today and learn how you can improve your security capabilities.