Thursday, December 7, 2023

Emotet Malware’s New Evasion Technique Lets Hacked Device Used as Proxy command and control (C&C) servers

A new wave of Emotet malware using a special type of evasion technique to fool the security software and hide the POST-infection traffic and evade the detection.

Also it initially uses the hacked devices as proxy command and control (C&C) servers and redirects the traffic to the original C&C server that operating by threat actors.

Emotet is one of the notorious malware family that infects various victims around the would and the operator behind this malware earned millions of Dollars.

Researchers says that the traffic is very complex to analyse due to various evasion technique that is being used during the malware development phase.

Emotet malware is being used to compromise and collect vulnerable connected devices, which could become resources for other malicious purposes.

Emotet malware infection Process

Initially, a spam email campaign that contains an attached malicious invoice file and body of the email tricks users into downloading malicious files.

Attached zip is files actually password protected which required users to obtain the password from the body of the email and use it to open the file.

 “A look into the ZIP file shows that it contains variants of Powload (detected as Trojan.W97M.POWLOAD). If the user enters the password, the file uses Powershell to download an executable file, which is Emotet’s payload.”

A post infection traffic contains a randomized number used as a URI directory path that helps the malware evade network-based detection. 

New Emotet post-infection HTTP Post request traffic

The previous version of Emotet malware used an HTTP GET request to send victim information to the C&C server and the stolen data store in the cookie header.

Comparison between the new Emotet C&C traffic and the previous Emotet C&C traffic

But this new wave Actors stayed away from using the Cookie header and changed the HTTP request method to POST. The data is still encrypted with an RSA key and AES, and encoded in Base 64.

According to Trend Micro Research, “Investigating some of the most recent live IP addresses of known Emotet C&C servers, we saw that they were actually different types of connected devices: One is the web interface of the router, another is an embedded server for managing printers and other devices “

This new campaign was observed since March and its clear that the connected devices are used for the additional layer of command & controls server communication.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read:

Hackers Used US-based Web Servers to Distribute 10 Malware Families Via Weaponized Word Documents

Emotet Malware Mass Attack Drops Nozelesn Ransomware on Enterprise Endpoint Systems Via Word Documents

APT-C-27 Hackers Launching njRAT Backdoor via Weaponized Word Documents to Control the Compromised Device


Latest articles

Bluetooth keystroke-injection Flaw: A Threat to Apple, Linux & Android Devices

An unauthenticated Bluetooth keystroke-injection vulnerability that affects Android, macOS, and iOS devices has been...

Atlassian Patches RCE Flaw that Affected Multiple Products

Atlassian has been discovered with four new vulnerabilities associated with Remote Code Execution in...

Reflectiz Introduces AI-powered Insights on Top of Its Smart Alerting System

Reflectiz, a cybersecurity company specializing in continuous web threat management, proudly introduces a new...

SLAM Attack Gets Root Password Hash in 30 Seconds

Spectre is a class of speculative execution vulnerabilities in microprocessors that can allow threat...

Akira Ransomware Exploiting Zero-day Flaws For Organization Network Access

The Akira ransomware group, which first appeared in March 2023, has been identified as...

Hackers Deliver AsyncRAT Through Weaponized WSF Script Files

The AsyncRAT malware, which was previously distributed through files with the .chm extension, is now being...

BlueNoroff: New Malware Attacking MacOS Users

Researchers have uncovered a new Trojan-attacking macOS user that is associated with the BlueNoroff APT...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

API Attack Simulation Webinar

Live API Attack Simulation

In the upcoming webinar, Karthik Krishnamoorthy, CTO and Vivek Gopalan, VP of Products at Indusface demonstrate how APIs could be hacked.The session will cover:an exploit of OWASP API Top 10 vulnerability, a brute force account take-over (ATO) attack on API, a DDoS attack on an API, how a WAAP could bolster security over an API gateway

Related Articles