IT
221

New Emotet Infection Method






  17-Feb-2022 15:00:04



As early as Dec. 21, 2021, Unit 42 observed a new infection method for the highly prevalent malware family Emotet. Emotet is high-volume malware that often changes and modifies its attack patterns. This latest modification of the Emotet attack follows suit. The new attack delivers an Excel file through email, and the document contains an obfuscated Excel 4.0 macro. When the macro is activated, it downloads and executes an HTML application that downloads two stages of PowerShell to retrieve and execute the final Emotet payload.

REFERENCE:
https://unit42.paloaltonetworks.com/new-emotet-infection-method/
MALWARE FAMILY:
Emotet
ATT&CK IDS:
T1104 - Multi-Stage Channels, T1027 - Obfuscated Files or Information, T1566 - Phishing, T1137 - Office Application Startup

Source : https://otx.alienvault.com/pulse/620d05df6542c4412e8ff9f7


DISCUSSION
Nothing comment here :(
Login for comment and discussion.
Login Here
Sponsored

Oppss... No sponsors yet

Popular Posts
Complete Basic Course in Kali...
Djie sam soe Djie sam soe
Linux
12409
2
Top

Gps Tracker Seccodeid Free Too...
Djie sam soe Djie sam soe
General
7349
167
Top

Free Proxy List
Sandidi Sandidi
Networking
3161
3
Top

Mass Reverse IP Unlimited
ImamWawe ImamWawe
Tools Hacking
2550
12
Top

Report McAfee Antivirus Hurrri...
Indrasp Indrasp
Windows
1762
93
Top

Related Post

Youtube Video

Subscribe