An Emotet-driven intrusion led to domain-wide deployment of Quantum ransomware after eight days, leveraging Cobalt Strike for discovery and lateral movement and remote-access tools for persistence. The operation included initial access via LNK, PowerShell-based download, data exfiltration to Mega via Rclone, and a coordinated ransomware campaign across the network.
#Emotet #QuantumRansomware #CobaltStrike #Anydesk #TacticalRMM #Rclone #MegaStorage
#Emotet #QuantumRansomware #CobaltStrike #Anydesk #TacticalRMM #Rclone #MegaStorage
Keypoints
- Initial access occurred when a user opened a malicious LNK file delivering an encoded PowerShell payload that downloads Emotet.
- Emotet established persistence via a Registry Run Key on the beachhead host.
- A multi-day sequence involved discovery commands (systeminfo, ipconfig, nltest) and later a Cobalt Strike beacon for extended intra-network discovery and lateral movement.
- Remote-access tools (Tactical RMM, MeshAgent, AnyDesk) were deployed to maintain access and enable control over endpoints.
- Credential access and process injection were used to enumerate domain admins, dump credentials, and probe SMB shares.
- Data exfiltration occurred to Mega via Rclone, followed by a domain-wide ransomware deployment using locker.dll and Dont Sleep to facilitate propagation.
MITRE Techniques
- [T1059.001] PowerShell – The LNK-delivered PowerShell script decodes and executes payloads to download Emotet. Quote: “The Powershell script embedded within the LNK is a Base64 encoded script with various components split into different variables for obfuscation purposes. The script will decode itself…”
- [T1218.011] Rundll32 – Emotet execution utilized Windows’ rundll32 to trigger payloads. Quote: “The specific mechanism used to inject into a foreign process, was injecting arbitrary code into its memory space, and executing it as a remotely created thread.”
- [T1218.010] Regsvr32 – The Emotet DLL was launched via regsvr32. Quote: “As we can see, regsvr32.exe Windows’s native utility was used to launch the Emotet DLL.”
- [T1055] Process Injection – The threat actor injected code into legitimate processes (e.g., winlogon.exe, svchost.exe) to run Cobalt Strike payloads. Quote: “The specific mechanism used to inject into a foreign process, was injecting arbitrary code into its memory space, and executing it as a remotely created thread.”
- [T1057] Process Discovery – Discovery using tasklist and other process-oriented queries. Quote: “The threat actors proceeded to run the net commands to review the Domain Administrators group again.”
- [T1018] Remote System Discovery – Discovery activities across the network (domain controllers, domain admins). Quote: “they began conducting a new round of discovery activity.”
- [T1021.002] SMB/Windows Admin Shares – Lateral movement across SMB shares and remote services. Quote: “SMB file transfers and remote services to move laterally across domain controllers…”
- [T1570] Lateral Tool Transfer – Tools transferred between hosts (SMB, WMI) for propagation. Quote: “transferring a beacon executable over SMB to the remote host’s ProgramData directory.”
- [T1078] Valid Accounts – Domain admin and credential-related activity observed (e.g., domain admins group, Netlogon authentications). Quote: “review the Domain Administrators group again” and “A flight of netlogon authentications were observed…”
- [T1569.002] Service Execution – Creation of services to run malicious agents (Tactical RMM Agent Service, Mesh Agent). Quote: “A service was installed in the system. Service Name: TacticalRMM Agent Service…”
- [T1021.001] Remote Desktop Protocol – RDP was used to move laterally and reach additional hosts. Quote: “Remote Desktop connections were discovered on multiple compromised hosts…”
- [T1071.001] Web Protocols – Emotet/Cobalt Strike C2 used HTTP/HTTPS for command and control. Quote: “Cobalt Strike C2 servers were observed being used. Both HTTP and HTTPS were observed to be used.”
- [T1567.002] Exfiltration to Cloud Storage – Data exfiltrated to Mega via Rclone. Quote: “threat actors leveraged Rclone to exfiltrate data to Mega storage services.”
- [T1210] Exploitation of Remote Services – Zerologon attempt and remote-service exploitation observed (e.g., domain controller targeting). Quote: “a possible attempt at exploiting the domain controller.”
- [T1082] System Information Discovery – Repeated enumeration of system information. Quote: “three automated discovery commands were observed… systeminfo … nltest … ipconfig.”
- [T1069.002] Domain Groups – Discovery of domain groups (Domain Admins, Domain Controllers, etc.). Quote: “whoami /groups net group /domain ‘Domain admins’ /domain”
Indicators of Compromise
- [Domain] contextual domains – descontador[.]com[.]br, www.elaboro[.]pl, el-energiaki[.]gr, drechslerstammtisch[.]de, dhnconstrucciones[.]com[.]ar, dilsrl[.]com – Emotet loader and C2 domains
- [IP] network destinations – 103.159.224.46, 103.75.201.2, 119.193.124.41, 128.199.225.17 – Emotet/C2 and loader infrastructure
- [File] executables and scripts – 17jun.exe, locker.dll, netscan.exe, rclone.exe, dontsleep.exe, 1.bat – Payloads and discovery/exfiltration tooling
- [Hash] file/artifact hashes – 0ea68856c4f56f4056502208e97e9033, d2df4601c8d43e655163c0b292bc4cc9, 27f7186499bc8d10e51d17d3d6697bc5 – Sample hashes from the Computed list
- [Domain] Cobalt Strike C2 hosts – survefuz[.]com, juanjik[.]com – “Cobalt Strike C2 servers” and their certificates
- [Domain] Tactical RMM / AnyDesk domains – api.floppasoftware[.]com, mesh.floppasoftware[.]com, icanhazip.tacticalrmm.io – C2 and remote-access infrastructure
- [Domain] Mega storage/exfil – megas storage endpoints via rclone.conf references
- [Other] Cloud/exfil indicators – Mega.nz usage shown in Rclone commands
Read more: https://thedfirreport.com/2022/11/28/emotet-strikes-again-lnk-file-leads-to-domain-wide-ransomware/