Cyble – Emotet Returns Targeting Users Worldwide

Emotet has re-emerged, spreading worldwide again via spam emails with Excel attachments and macro-enabled documents to download its payloads. The campaign delivers follow-on payloads like IcedID and Bumblebee and has historically offered Malware-as-a-Service (MaaS) to other threat actors for deploying TrickBot, Qakbot, and ransomware.

Keypoints

  • Emotet reappeared in November 2022 after a period of reduced activity, with a worldwide spread across dozens of countries.
  • Initial infection occurs through spam emails containing xls/xlsm attachments or password-protected ZIPs, with malicious macros designed to download the Emotet payload.
  • The campaign uses social engineering to bypass Microsoft Office protections and entice users to enable macros.
  • Emotet acts as Malware-as-a-Service, delivering other families such as TrickBot, Qakbot, and ransomware for broader impact.
  • Recent activity shows Emotet downloading additional payloads like IcedID and Bumblebee, often via DLLs and remote URLs, to extend capabilities on affected machines.
  • Emotet establishes persistence and C2 communications, including task scheduler entries and multiple C2 download URLs and IPs/ports.
  • Defensive recommendations emphasize email/attachment caution, strong authentication, regular offline backups, and updated security tools to mitigate similar campaigns.

MITRE Techniques

  • [T1566.001] Phishing – Spearphishing Attachment – The Emotet campaign uses spam email with xls/xlsm or password-protected attachments to deliver the payload. “…The Emotet arrives to users via spam email containing an xls/xlsm or password-protected attachment…”
  • [T1204] User Execution – Malicious macro execution is triggered when users open the Office document and are social engineered to enable macros. “…Threat Actors behind this Emotet try various social Engineering techniques to lure the users into enabling the macro content.”
  • [T1059] Command and Scripting Interpreter – Macros in Office documents download and execute the Emotet payload, acting as the scripting interpreter for the drop.
  • [T1547.001] Boot or Logon Autostart Execution – Persistence via startup/autorun mechanisms (e.g., task scheduler entries) to maintain presence. “After installing the IcedID into the victim’s system, it adds the DLL files into the task scheduler entry for its persistence.”
  • [T1497] Virtualization/Sandbox Evasion – Defenses are bypassed by new templates that circumvent Protected View to run macros. “…new template that contains instructions to bypass Microsoft’s Protected View.”
  • [T1087] Account Discovery – The article’s MITRE mapping includes Account Discovery as a phase of the attack sequence. “…Account Discovery”
  • [T1071] Application Layer Protocol – Ingress Tool Transfer – The malware communicates with C2 and transfers tools via application-layer protocols. “…connects to the C&C server for further instructions or to install additional payloads.”
  • [T1105] Ingress Tool Transfer – Downloading Emotet/IcedID payloads from remote URLs. “…downloads Emotet DLL (Dynamic Link Library) file from the following URLs…”

Indicators of Compromise

  • [IOC Type] MD5/SHA-1/SHA-256 – Spam email – e5192c6239f67745e99d626cd3df8a58, b67c12c03394ca14788991fc3243c41443a2a9d8, and 2 more hashes
  • [IOC Type] MD5/SHA-1/SHA-256 – Emotet DLL (ObpgVIuUvWX.dll) – 5f144bff7013b9d25527d7baaa9ac4fb, 6fcd48a2708fe81419ff9becc39ef3ca5a35e134
  • [IOC Type] MD5/SHA-1/SHA-256 – IcedID DLL (eqamup1.dll) – 2d5ed2b25105753b8dfbc68e38718f2d, 7c1160e74747648485a2e3af179d060d7c4a33c4
  • [IOC Type] MD5/SHA-1/SHA-256 – IcedID DLL (ifocnf.dll) – 59e3813b05edcb779baa462791f1a3383498bd0a6bc95, 993e6bd0c8e4ce0e059
  • [IOC Type] URL – Emotet DLL payload – designelis.com.br/wp-content/NNfbZZegI/, copayucatan.com.mx/wp-includes/BqaJMpC3osZ0LRnKK/
  • [IOC Type] URL – IcedID binary – bayernbadabum.com/botpack.dat
  • [IOC Type] URL – Bumblebee downloader – 87.251.67.176/tps1.ps1
  • [IOC Type] URL – Bumblebee DLL – 134.209.118.141/bb.dll
  • [IOC Type] IP:Port – Emotet C&C/config – 45.235.8.30:8080, 139.59.126.41:443
  • [IOC Type] File name – 6096.xls – Emotet spam attachment

Read more: https://blog.cyble.com/2022/11/09/emotet-returns-targeting-users-worldwide/