S0367 Emotet
Emotet is a modular malware variant which is primarily used as a downloader for other malware variants such as TrickBot and IcedID. Emotet first emerged in June 2014 and has been primarily used to target the banking sector. 8
Item | Value |
---|---|
ID | S0367 |
Associated Names | Geodo |
Type | MALWARE |
Version | 1.4 |
Created | 25 March 2019 |
Last Modified | 17 January 2023 |
Navigation Layer | View In ATT&CK® Navigator |
Associated Software Descriptions
Name | Description |
---|---|
Geodo | 12 |
Techniques Used
Domain | ID | Name | Use |
---|---|---|---|
enterprise | T1087 | Account Discovery | - |
enterprise | T1087.003 | Email Account | Emotet has been observed leveraging a module that can scrape email addresses from Outlook.316 |
enterprise | T1560 | Archive Collected Data | Emotet has been observed encrypting the data it collects before sending it to the C2 server. 14 |
enterprise | T1547 | Boot or Logon Autostart Execution | - |
enterprise | T1547.001 | Registry Run Keys / Startup Folder | Emotet has been observed adding the downloaded payload to the HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run key to maintain persistence.11137 |
enterprise | T1110 | Brute Force | - |
enterprise | T1110.001 | Password Guessing | Emotet has been observed using a hard coded list of passwords to brute force user accounts. 10111363 |
enterprise | T1059 | Command and Scripting Interpreter | - |
enterprise | T1059.001 | PowerShell | Emotet has used Powershell to retrieve the malicious payload and download additional resources like Mimikatz. 11127415 |
enterprise | T1059.003 | Windows Command Shell | Emotet has used cmd.exe to run a PowerShell script. 7 |
enterprise | T1059.005 | Visual Basic | Emotet has sent Microsoft Word documents with embedded macros that will invoke scripts to download additional payloads. 11112715 |
enterprise | T1543 | Create or Modify System Process | - |
enterprise | T1543.003 | Windows Service | Emotet has been observed creating new services to maintain persistence. 136 |
enterprise | T1555 | Credentials from Password Stores | - |
enterprise | T1555.003 | Credentials from Web Browsers | Emotet has been observed dropping browser password grabber modules. 1216 |
enterprise | T1114 | Email Collection | - |
enterprise | T1114.001 | Local Email Collection | Emotet has been observed leveraging a module that scrapes email data from Outlook.3 |
enterprise | T1573 | Encrypted Channel | - |
enterprise | T1573.002 | Asymmetric Cryptography | Emotet is known to use RSA keys for encrypting C2 traffic. 12 |
enterprise | T1041 | Exfiltration Over C2 Channel | Emotet has been seen exfiltrating system information stored within cookies sent within an HTTP GET request back to its C2 servers. 12 |
enterprise | T1210 | Exploitation of Remote Services | Emotet has been seen exploiting SMB via a vulnerability exploit like EternalBlue (MS17-010) to achieve lateral movement and propagation. 111364 |
enterprise | T1040 | Network Sniffing | Emotet has been observed to hook network APIs to monitor network traffic. 8 |
enterprise | T1571 | Non-Standard Port | Emotet has used HTTP over ports such as 20, 22, 7080, and 50000, in addition to using ports commonly associated with HTTP/S.1 |
enterprise | T1027 | Obfuscated Files or Information | - |
enterprise | T1027.002 | Software Packing | Emotet has used custom packers to protect its payloads.12 |
enterprise | T1027.010 | Command Obfuscation | Emotet has obfuscated macros within malicious documents to hide the URLs hosting the malware, CMD.exe arguments, and PowerShell scripts. 112717 |
enterprise | T1003 | OS Credential Dumping | - |
enterprise | T1003.001 | LSASS Memory | Emotet has been observed dropping password grabber modules including Mimikatz. 12 |
enterprise | T1566 | Phishing | - |
enterprise | T1566.001 | Spearphishing Attachment | Emotet has been delivered by phishing emails containing attachments. 210111311271516 |
enterprise | T1566.002 | Spearphishing Link | Emotet has been delivered by phishing emails containing links. 892101113117 |
enterprise | T1057 | Process Discovery | Emotet has been observed enumerating local processes.18 |
enterprise | T1055 | Process Injection | - |
enterprise | T1055.001 | Dynamic-link Library Injection | Emotet has been observed injecting in to Explorer.exe and other processes. 7813 |
enterprise | T1021 | Remote Services | - |
enterprise | T1021.002 | SMB/Windows Admin Shares | Emotet leverages the Admin$ share for lateral movement once the local admin password has been brute forced. 10 |
enterprise | T1053 | Scheduled Task/Job | - |
enterprise | T1053.005 | Scheduled Task | Emotet has maintained persistence through a scheduled task. 13 |
enterprise | T1552 | Unsecured Credentials | - |
enterprise | T1552.001 | Credentials In Files | Emotet has been observed leveraging a module that retrieves passwords stored on a system for the current logged-on user. 133 |
enterprise | T1204 | User Execution | - |
enterprise | T1204.001 | Malicious Link | Emotet has relied upon users clicking on a malicious link delivered through spearphishing.815 |
enterprise | T1204.002 | Malicious File | Emotet has relied upon users clicking on a malicious attachment delivered through spearphishing.81516 |
enterprise | T1078 | Valid Accounts | - |
enterprise | T1078.003 | Local Accounts | Emotet can brute force a local admin password, then use it to facilitate lateral movement.10 |
enterprise | T1047 | Windows Management Instrumentation | Emotet has used WMI to execute powershell.exe.15 |
Groups That Use This Software
ID | Name | References |
---|---|---|
G0102 | Wizard Spider | 1920 |
References
-
Brumaghin, E.. (2019, January 15). Emotet re-emerges after the holidays. Retrieved March 25, 2019. ↩↩↩↩↩↩
-
CIS. (2017, April 28). Emotet Changes TTPs and Arrives in United States. Retrieved January 17, 2019. ↩↩
-
CIS. (2018, December 12). MS-ISAC Security Primer- Emotet. Retrieved March 25, 2019. ↩↩↩↩
-
Donohue, B.. (2019, February 13). https://redcanary.com/blog/stopping-emotet-before-it-moves-laterally/. Retrieved March 25, 2019. ↩↩
-
ESET . (2018, November 9). Emotet launches major new spam campaign. Retrieved March 25, 2019. ↩
-
Mclellan, M.. (2018, November 19). Lazy Passwords Become Rocket Fuel for Emotet SMB Spreader. Retrieved March 25, 2019. ↩↩↩
-
Özarslan, S. (2018, December 21). The Christmas Card you never wanted - A new wave of Emotet is back to wreak havoc. Retrieved March 25, 2019. ↩↩↩↩↩↩↩↩
-
Salvio, J.. (2014, June 27). New Banking Malware Uses Network Sniffing for Data Theft. Retrieved March 25, 2019. ↩↩↩↩↩↩
-
Shulmin, A. . (2015, April 9). The Banking Trojan Emotet: Detailed Analysis. Retrieved March 25, 2019. ↩
-
Smith, A.. (2017, December 22). Protect your network from Emotet Trojan with Malwarebytes Endpoint Security. Retrieved January 17, 2019. ↩↩↩↩↩
-
Symantec. (2018, July 18). The Evolution of Emotet: From Banking Trojan to Threat Distributor. Retrieved March 25, 2019. ↩↩↩↩↩↩↩
-
Trend Micro. (2019, January 16). Exploring Emotet’s Activities . Retrieved March 25, 2019. ↩↩↩↩↩↩↩↩↩↩
-
US-CERT. (2018, July 20). Alert (TA18-201A) Emotet Malware. Retrieved March 25, 2019. ↩↩↩↩↩↩↩↩↩
-
Xiaopeng Zhang. (2017, May 3). Deep Analysis of New Emotet Variant – Part 1. Retrieved April 1, 2019. ↩
-
Lee, S.. (2019, April 24). Emotet Using WMI to Launch PowerShell Encoded Code. Retrieved May 24, 2019. ↩↩↩↩↩↩
-
Kessem, L., et al. (2017, November 13). New Banking Trojan IcedID Discovered by IBM X-Force Research. Retrieved July 14, 2020. ↩↩↩↩
-
Perez, D.. (2018, December 28). Analysis of the latest Emotet propagation campaign. Retrieved April 16, 2019. ↩
-
ASEC. (2017). ASEC REPORT VOL.88. Retrieved April 16, 2019. ↩
-
John, E. and Carvey, H. (2019, May 30). Unraveling the Spiderweb: Timelining ATT&CK Artifacts Used by GRIM SPIDER. Retrieved May 12, 2020. ↩
-
Sean Gallagher, Peter Mackenzie, Elida Leite, Syed Shahram, Bill Kearney, Anand Aijan, Sivagnanam Gn, Suraj Mundalik. (2020, October 14). They’re back: inside a new Ryuk ransomware attack. Retrieved October 14, 2020. ↩