TrojanSpy.Win32.EMOTET.YXCBDZ

 Analysis by: Nathaniel Gregory Ragasa

 ALIASES:

Trojan.Win32.Crypt(IKARUS), Win32/Emotet.CQ trojan(NOD32)

 PLATFORM:

Windows

 OVERALL RISK RATING:
 DAMAGE POTENTIAL:
 DISTRIBUTION POTENTIAL:
 REPORTED INFECTION:
 INFORMATION EXPOSURE:

  • Threat Type: Trojan Spy

  • Destructiveness: No

  • Encrypted:

  • In the wild: Yes

  OVERVIEW


This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

  TECHNICAL DETAILS

File Size:

1,000,448 bytes

File Type:

DLL

Memory Resident:

No

Arrival Details

This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

Installation

This Trojan Spy drops a copy of itself in the following folders using different file names:

  • %System%\{Random Characters}\{Random Characters}.{Random Characters}

(Note: %System% is the Windows system folder, where it usually is C:\Windows\System32 on all Windows operating system versions.)

It adds the following processes:

  • %System%\rundll32.exe "%System%\{Random Characters}\{Random Characters}.{Random Characters}",{Random Characters}
  • %System%\rundll32.exe "%System%\{Random Characters}\{Random Characters}.{Random Characters}",DllRegisterServer

(Note: %System% is the Windows system folder, where it usually is C:\Windows\System32 on all Windows operating system versions.)

Other Details

This Trojan Spy connects to the following possibly malicious URL:

  • http://{BLOCKED}.{BLOCKED}.201.2
  • http://{BLOCKED}.{BLOCKED}.201.4
  • http://{BLOCKED}.{BLOCKED}.214.46
  • http://{BLOCKED}.{BLOCKED}.225.142
  • http://{BLOCKED}.{BLOCKED}.117.186
  • http://{BLOCKED}.{BLOCKED}.255.201
  • http://{BLOCKED}.{BLOCKED}.188.93
  • http://{BLOCKED}.{BLOCKED}.24.231
  • http://{BLOCKED}.{BLOCKED}.72.26
  • http://{BLOCKED}.{BLOCKED}.186.49
  • http://{BLOCKED}.{BLOCKED}.186.55
  • http://{BLOCKED}.{BLOCKED}.222.101
  • http://{BLOCKED}.{BLOCKED}.59.82
  • http://{BLOCKED}.{BLOCKED}.230.105
  • http://{BLOCKED}.{BLOCKED}.102.168
  • http://{BLOCKED}.{BLOCKED}.50.39
  • http://{BLOCKED}.{BLOCKED}.175.63
  • http://{BLOCKED}.{BLOCKED}.99.3
  • http://{BLOCKED}.{BLOCKED}.193.249
  • http://{BLOCKED}.{BLOCKED}.106.96
  • http://{BLOCKED}.{BLOCKED}.83.165
  • http://{BLOCKED}.{BLOCKED}.147.66
  • http://{BLOCKED}.{BLOCKED}.82.211
  • http://{BLOCKED}.{BLOCKED}.71.210
  • http://{BLOCKED}.{BLOCKED}.56.148
  • http://{BLOCKED}.{BLOCKED}.133.20
  • http://{BLOCKED}.{BLOCKED}.134.35
  • http://{BLOCKED}.{BLOCKED}.109.124
  • http://{BLOCKED}.{BLOCKED}.84.195
  • http://{BLOCKED}.{BLOCKED}.17.99
  • http://{BLOCKED}.{BLOCKED}.5.209
  • http://{BLOCKED}.{BLOCKED}.56.116
  • http://{BLOCKED}.{BLOCKED}.98.99
  • http://{BLOCKED}.{BLOCKED}.226.206
  • http://{BLOCKED}.{BLOCKED}.143.207
  • http://{BLOCKED}.{BLOCKED}.204.126
  • http://{BLOCKED}.{BLOCKED}.108.46
  • http://{BLOCKED}.{BLOCKED}.115.99
  • http://{BLOCKED}.{BLOCKED}.135.203
  • http://{BLOCKED}.{BLOCKED}.114.231
  • http://{BLOCKED}.{BLOCKED}.232.124
  • http://{BLOCKED}.{BLOCKED}.222.11
  • http://{BLOCKED}.{BLOCKED}.54.215
  • http://{BLOCKED}.{BLOCKED}.140.238
  • http://{BLOCKED}.{BLOCKED}.42.236
  • http://{BLOCKED}.{BLOCKED}.212.216
  • http://{BLOCKED}.{BLOCKED}.236.90
  • http://{BLOCKED}.{BLOCKED}.152.127