TSPY_EMOTET.AUSJNP
Windows


Threat Type: Spyware
Destructiveness: No
Encrypted:
In the wild: Yes
OVERVIEW
This Spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
It deletes itself after execution.
TECHNICAL DETAILS
Arrival Details
This Spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Installation
This Spyware drops and executes the following files:
- %System%\{random alphanumeric characters}.exe
- %System%\{filename 1}{filename 2}.exe
(Note: %System% is the Windows system folder, where it usually is C:\Windows\System32 on all Windows operating system versions.)
Autostart Technique
This Spyware registers itself as a system service to ensure its automatic execution at every system startup by adding the following registry entries:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\
services\{filename 1}{filename 2}
ImagePath = %System%\{filename 1}{filename 2}.exe
Other Details
This Spyware connects to the following possibly malicious URL:
- {BLOCKED}4.{BLOCKED}7.140.51
- {BLOCKED}1.{BLOCKED}2.140.140
- {BLOCKED}8.{BLOCKED}9.236.204
- {BLOCKED}9.{BLOCKED}8.17.49
- {BLOCKED}8.{BLOCKED}4.238.174
It deletes itself after execution.

