Thursday, July 18, 2024

Hackers Drops New Emotet Malware to Perform Mass Email Exfiltration From Victims Email Client

Emotet Malware re-emerging to perform mass email exfiltration with a new form of infection capabilities to steal sensitive Email data directly from victims Email Client.

The US-Cert team already issued an alert for an advanced Emotet malware attack that targets governments, private and public sectors in the most destructive way to steal various sensitive information.

The new Emotet malware campaign emerged again with a new module that capable of exfiltrating email content and send back to the attackers.

Also, it has some interesting new capabilities with this new campaign that enables email capture, examine the exfiltration process, and observe its global distribution.

Emotet Malware already caused very serious damage and it affected many countries,  U.S is one of the countries targeted by Emotet that made a huge damage in both government and private networks.

Emotet Malware Email Harvesting Process

Unlike old Emotet malware that steals contact list using  Outlook Messaging API, this new campaign used an API interface that gives an application access to email.

Old Emotet malware checks the configuration module of the email client especially the  registry key HKLM\Software\Clients\Mail\Microsoft Outlookto exfiltrate the Email data.

According to kryptoslogic, The new module, however, is more thorough, and also includes email subjects and bodies. It will crawl every email of every subfolder in the interpersonal message (IPM) root folder, and Perform the following actions

  • Verify whether the email has been sent/received (PR_MESSAGE_DELIVERY_TIME) in the last 100e-9 * 15552000000 * 10000 / 3600 / 24 = 180 days;
  • If the body is longer than 16384 characters, it is truncated to this size plus the string ....

Later on this Harvesting process, A DLL module drops by Emotet from the C2 server that injects payload binary into a new Emotet process.

Later it scans all the emails in the compromised email clients & saves the results to a temporary file and wait for this new DLL for the payload to finish the process else it kills after 300 seconds.

If the saved temporary file is bigger than  116 bytes then Original DLL issues an HTTP request using the WinINet API that helps to send the temporary file to the attacker via the C2 server.

“While Emotet’s operators may have simply moved to server-side extraction, harvesting data in mass provides a weaponized data-driven analytical capability which should not be underestimated, given how effective surgical email leaks have been in the recent past. ” Researchers said.


Latest articles

Volcano Demon Group Attacking Organizations With LukaLocker Ransomware

The Volcano Demon group has been discovered spreading a new ransomware called LukaLocker, which...

Resonance Security Launches Harmony to Monitor and Detect Threats to Web2 and Web3 Apps

Quick take:Harmony is the fourth cybersecurity application Resonance developed to address the disconnect in...

Beware! of New Phishing Tactics Mimic as HR Attacking Employees

Phishing attacks are becoming increasingly sophisticated, and the latest strategy targeting employees highlights this...

MirrorFace Attacking Organizations Exploiting Vulnerabilities In Internet-Facing Assets

MirrorFace threat actors have been targeting media, political organizations, and academic institutions since 2022,...

HardBit Ransomware Using Passphrase Protection To Evade Detection

In 2022, HardBit Ransomware emerged as version 4.0. Unlike typical ransomware groups, this ransomware...

New Poco RAT Weaponizing 7zip Files Using Google Drive

The hackers weaponize 7zip files to pass through security measures and deliver malware effectively.These...

New ShadowRoot Ransomware Attacking Business Via Weaponized PDF’s

X-Labs identified basic ransomware targeting Turkish businesses, delivered via PDF attachments in suspicious emails...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles