Saturday, December 28, 2024
HomeComputer SecurityNew Wave of Emotet Malware Hacks Wi-Fi Networks to Attack New Victims

New Wave of Emotet Malware Hacks Wi-Fi Networks to Attack New Victims

Published on

SIEM as a Service

A new wave of Emotet malware campaign With New Wi-Fi Spreader takes advantage of the wlanAPI interface to enumerate all Wi-Fi networks in the area and spreads the infection.

The Emotet is a banking Trojan detected in the year 2014, it was designed to steal sensitive and private information.

It is one of the most dangerous malware and it is capable of delivering payloads based on the specific tasks. It’s warm like capability helps to spread rapidly with other connected computers.

- Advertisement - SIEM as a Service

Malware Infection

Emotet primarily distributed through social engineering techniques such as the emails with the links to download the malware.

With the new Emotet campaign it arrives with a new Wi-Fi Spreader module downloads to the system C:\ProgramData. The downloaded binary contains a self-extracting RAR that has two (service.exe and worm.exe) binaries to spread the infection through WiFi.

Emotet wifi
Worm file Download

The worm.exe is the executable used for spreading the malware, once it executed it copies the service.exe to a variable for using it while spreading.

Then it calls wlanAPI.dll class that used by Native Wi-Fi to manage the wireless network profiles and connections for spreading the infection to other networks.

Emotet wifi
Emotet Wifi Distribution

“The Worm enumerates all Wi-Fi devices currently enabled on the local computer, which it returns in a series of structures. These structures contain all the information relating to the Wi-Fi device, including the device’s GUID and description,” read the Binary Defense analysis.

It gathers possible information from every available Wi-Fi network present in the list of networks.

Breaking Weak Wi-Fi Network

Once the connection established with the Wi-Fi network it enumerates users and attempts brute-force for all users on the network.

Next, the Service.exe is the payload installed by worm.exe on the machine, once installed it communicates with the C2 server and executes the binary embedded in service.exe.

Previously Emotet known to distributed only through malspam and infected networks, with this new loader it spreads through nearby wireless networks that use weak passwords.

IOCs

9.file            865cf5724137fa74bd34dd1928459110385af65ffa63b3734e18d09065c0fb36
Worm.exe 077eadce8fa6fc925b3f9bdab5940c14c20d9ce50d8a2f0be08f3071ea493de8
Service.exe 64909f9f44b02b6a4620cdb177373abb229624f34f402335ecdb4d7c8b58520b
Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Lumma Stealer Attacking Users To Steal Login Credentials From Browsers

Researchers observed Lumma Stealer activity across multiple online samples, including PowerShell scripts and a...

New ‘OtterCookie’ Malware Attacking Software Developers Via Fake Job Offers

Palo Alto Networks reported the Contagious Interview campaign in November 2023, a financially motivated...

NjRat 2.3D Pro Edition Shared on GitHub: A Growing Cybersecurity Concern

The recent discovery of the NjRat 2.3D Professional Edition on GitHub has raised alarms...

Palo Alto Networks Vulnerability Puts Firewalls at Risk of DoS Attacks

A critical vulnerability, CVE-2024-3393, has been identified in the DNS Security feature of Palo...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Lumma Stealer Attacking Users To Steal Login Credentials From Browsers

Researchers observed Lumma Stealer activity across multiple online samples, including PowerShell scripts and a...

New ‘OtterCookie’ Malware Attacking Software Developers Via Fake Job Offers

Palo Alto Networks reported the Contagious Interview campaign in November 2023, a financially motivated...

Skuld Malware Using Weaponized Windows Utilities Packages To Deliver Malware

Researchers discovered a malware campaign targeting the npm ecosystem, distributing the Skuld info stealer...