On November 9, 2017, our Threat Guidance team received a request to analyze a malicious document intended to infect a targeted system with the Emotet infostealer malware, a variant of the Feodo Trojan family.
Emotet first emerged in 2014 as a Trojan designed to steal banking credentials and other sensitive information, and is most often propagated by way of phishing emails containing a tainted document or URL.
As the holiday season is upon us, extra care should be taken when interacting with emails that contain attachments purporting to be invoices or other business communications or links to similar document, tactics attackers favor with the hope that distracted targets may let their guard down.
The sample analyzed in this report is a Microsoft Word Document that contains a malicious macro program which was developed to download the Emotet malware, which then searches the targeted system for sensitive information that will be exfiltrated to the command and control (C2) servers under the attackers’ control.
The attacker then can sell the information harvested, or login into the account themselves to steal more information. Emotet can spread itself to other systems by stealing an address book from one computer on the network.
Read our Threat Guidance team's full technical write-up here:
[ Ссылка ]
Ещё видео!