TSPY_EMOTET.AUSJKR
Windows


Threat Type: Spyware
Destructiveness: No
Encrypted:
In the wild: Yes
OVERVIEW
This Spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
It deletes itself after execution.
TECHNICAL DETAILS
Arrival Details
This Spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Installation
This Spyware drops and executes the following files:
- %System%\{random alphanumeric characters}.exe
- %System%\{filename 1}{filename 2}.exe
(Note: %System% is the Windows system folder, where it usually is C:\Windows\System32 on all Windows operating system versions.)
Autostart Technique
This Spyware registers itself as a system service to ensure its automatic execution at every system startup by adding the following registry entries:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\
services\{filename 1}{filename 2}
ImagePath = %System%\{filename 1}{filename 2}.exe
Other Details
This Spyware connects to the following possibly malicious URL:
- {BLOCKED}.{BLOCKED}.73.150
- {BLOCKED}.{BLOCKED}.159.58
It deletes itself after execution.

