IT
453

New Emotet Infection Method






  17-Feb-2022 15:00:04



As early as Dec. 21, 2021, Unit 42 observed a new infection method for the highly prevalent malware family Emotet. Emotet is high-volume malware that often changes and modifies its attack patterns. This latest modification of the Emotet attack follows suit. The new attack delivers an Excel file through email, and the document contains an obfuscated Excel 4.0 macro. When the macro is activated, it downloads and executes an HTML application that downloads two stages of PowerShell to retrieve and execute the final Emotet payload.

REFERENCE:
https://unit42.paloaltonetworks.com/new-emotet-infection-method/
MALWARE FAMILY:
Emotet
ATT&CK IDS:
T1104 - Multi-Stage Channels, T1027 - Obfuscated Files or Information, T1566 - Phishing, T1137 - Office Application Startup

Source : https://otx.alienvault.com/pulse/620d05df6542c4412e8ff9f7

*Beware click the link!


DISCUSSION
Nothing comment here :(
Login for report, comment and join discussion
Login Here
Sponsored

Popular Posts
Gps Tracker Seccodeid Free Too...
General
21220
202
Top


Djie sam soe Djie sam soe
Complete Basic Course in Kali...
Linux
14255
4
Top


Djie sam soe Djie sam soe
Komintod (Ministry of Communic...
Data Leak
6442
78
Top


Murtad methamphetamine Murtad methamphetamine
Free Proxy List
Networking
3608
3
Top


Sandidi Sandidi
Mass Reverse IP Unlimited
Tools Hacking
3349
13
Top


ImamWawe ImamWawe

Related Post

Youtube Video

Subscribe