As early as Dec. 21, 2021, Unit 42 observed a new infection method for the highly prevalent malware family Emotet. Emotet is high-volume malware that often changes and modifies its attack patterns. This latest modification of the Emotet attack follows suit. The new attack delivers an Excel file through email, and the document contains an obfuscated Excel 4.0 macro. When the macro is activated, it downloads and executes an HTML application that downloads two stages of PowerShell to retrieve and execute the final Emotet payload.
REFERENCE:
https://unit42.paloaltonetworks.com/new-emotet-infection-method/
MALWARE FAMILY:
Emotet
ATT&CK IDS:
T1104 - Multi-Stage Channels, T1027 - Obfuscated Files or Information, T1566 - Phishing, T1137 - Office Application Startup
Source : https://otx.alienvault.com/pulse/620d05df6542c4412e8ff9f7
*Beware click the link!