Saturday, April 12, 2025
HomeComputer SecurityHackers Drops New Emotet Malware to Perform Mass Email Exfiltration From Victims...

Hackers Drops New Emotet Malware to Perform Mass Email Exfiltration From Victims Email Client

Published on

SIEM as a Service

Follow Us on Google News

Emotet Malware re-emerging to perform mass email exfiltration with a new form of infection capabilities to steal sensitive Email data directly from victims Email Client.

The US-Cert team already issued an alert for an advanced Emotet malware attack that targets governments, private and public sectors in the most destructive way to steal various sensitive information.

The new Emotet malware campaign emerged again with a new module that capable of exfiltrating email content and send back to the attackers.

- Advertisement - Google News

Also, it has some interesting new capabilities with this new campaign that enables email capture, examine the exfiltration process, and observe its global distribution.

Emotet Malware already caused very serious damage and it affected many countries,  U.S is one of the countries targeted by Emotet that made a huge damage in both government and private networks.

Emotet Malware Email Harvesting Process

Unlike old Emotet malware that steals contact list using  Outlook Messaging API, this new campaign used an API interface that gives an application access to email.

Old Emotet malware checks the configuration module of the email client especially the  registry key HKLM\Software\Clients\Mail\Microsoft Outlookto exfiltrate the Email data.

According to kryptoslogic, The new module, however, is more thorough, and also includes email subjects and bodies. It will crawl every email of every subfolder in the interpersonal message (IPM) root folder, and Perform the following actions

  • Verify whether the email has been sent/received (PR_MESSAGE_DELIVERY_TIME) in the last 100e-9 * 15552000000 * 10000 / 3600 / 24 = 180 days;
  • If so, obtain its sender (PR_SENDER_NAME_WPR_SENDER_EMAIL_ADDRESS_W), destination (PR_RECEIVED_BY_NAME_WPR_RECEIVED_BY_EMAIL_ADDRESS_W), subject (PR_SUBJECT_W) and body (PR_BODY_W).
  • If the body is longer than 16384 characters, it is truncated to this size plus the string ....

Later on this Harvesting process, A DLL module drops by Emotet from the C2 server that injects payload binary into a new Emotet process.

Later it scans all the emails in the compromised email clients & saves the results to a temporary file and wait for this new DLL for the payload to finish the process else it kills after 300 seconds.

If the saved temporary file is bigger than  116 bytes then Original DLL issues an HTTP request using the WinINet API that helps to send the temporary file to the attacker via the C2 server.

“While Emotet’s operators may have simply moved to server-side extraction, harvesting data in mass provides a weaponized data-driven analytical capability which should not be underestimated, given how effective surgical email leaks have been in the recent past. ” Researchers said.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...