Emotet Banking Trojan Family Re-emerges, Taps Malicious PDF Doc buy dumps with pin, ltdcc fresh shop
The Emotet family of banking malware has made an enormous resurgence for a couple of weeks now, targeting bank customers using a new batch of trojan-infested email spam. The new strain is now capable of scanning the victim’s user account, including the archive emails containing banking information if any. As per ESET, a mainstream antivirus vendor, Emotet’s new variant has been released to the wild en-mass by its authors in order to make headlines.
“According to our telemetry, the latest Emotet activity was launched on November 5, 2018, following a period of low activity. Breaking those detections down by country, this latest Emotet campaign appears to be most active in the Americas, the UK, Turkey, and South Africa. In the November 2018 campaign, Emotet makes use of malicious Word and PDF attachments posing as invoices, payment notifications, bank account alerts, etc., seemingly coming from legitimate organizations. Alternately, the emails contain malicious links instead of attachments. The email subjects used in the campaign suggest a targeting of English and German-speaking users,” explained ESET in their official blog site.
Sample emails containing the malicious pdf files containing Emotet’s payload were submitted to ESET. One of which was a specially crafted email pretending itself as an official Bank of America email, with official logo of the said bank and a very convincing social engineering appeal to the bank’s customer. The moment the user opens the PDF file attached in the malicious email, the computer will start downloading the harmful payload in the background without the user knowing. Same way goes with its .doc malicious attachment counterpart.
“The compromise scenario in this November 2018 campaign starts with the victim opening a malicious Word or PDF file attached to a spam email seemingly coming from a legitimate and familiar organization. (When) the victim enables macros in Word or clicks on the link in the PDF. The Emotet payload is subsequently installed and launched, establishes persistence on the computer and reports the successful compromise to its C&C server. In turn, it receives instructions on which attack modules and secondary payloads to download. The modules extend the initial payload’s functionality with one or more of credential-stealing, network propagation, sensitive information harvesting, port forwarding, and other capabilities,” added ESET.
ESET has publicly published the Emotet’s and its companion modules’ official SHA-1 hashes, for those system administrators who want to further inspect the code’s operation:
Main Emotet Module:
ESET Research team also publicly revealed the Command and Control Servers of Emotet, as of Nov 9, 2018:
Virus Removal App
buy dumps with pin ltdcc fresh shop