Site icon LIFARS, a SecurityScorecard company

Emotet is Back on the Main Stage Thanks to Trickbot

After we reported that the Emotet infrastructure was taken down by law enforcement here, security researcher Luca Ebach found that another malware botnet called Trickbot is helping Emotet to rebuild their botnet by installing the Emotet trojan on systems previously infected with Trickbot. .

Cryptolaemus group also reported at https://twitter.com/Cryptolaemus1/status/1460403592658145283 that they’ve seen bots starting to send emails with .docm, .xlsm and .zip attachments. Emotet has facilitated ransomware attacks in the past therefore we might encounter a surge of ransomware infections in the near future.

The following Emotet C2 servers should be monitored and blocked:

The picture below presents the network traffic from a host infected with Emotet, displayed in Wireshark:

Other indicators of compromise (SHA256 hashes):

 

References

https://cyber.wtf/2021/11/15/guess-whos-back/

https://twitter.com/Cryptolaemus1/status/1460403592658145283

https://github.com/executemalware/Malware-IOCs/blob/main/2021-11-15%20Emotet%20IOCs

https://isc.sans.edu/forums/diary/Emotet+Returns/28044/

Exit mobile version