TROJ_EMOTET.IJW


 ALIASES:

Win32/Emotet.AB (ESET)

 PLATFORM:

Windows

 OVERALL RISK RATING:
 DAMAGE POTENTIAL:
 DISTRIBUTION POTENTIAL:
 REPORTED INFECTION:
 INFORMATION EXPOSURE:

  • Threat Type: Trojan

  • Destructiveness: No

  • Encrypted:

  • In the wild: Yes

  OVERVIEW

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

However, as of this writing, the said sites are inaccessible.

  TECHNICAL DETAILS

File Size:

176,128 bytes

File Type:

EXE

Initial Samples Received Date:

22 Nov 2014

Arrival Details

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

Installation

This Trojan drops the following copies of itself into the affected system and executes them:

  • %Application Data%\Identities\{random filename}.exe

(Note: %Application Data% is the Application Data folder, where it usually is C:\Documents and Settings\{user name}\Application Data on Windows 2000, Windows Server 2003, and Windows XP (32- and 64-bit); C:\Users\{user name}\AppData\Roaming on Windows Vista (32- and 64-bit), Windows 7 (32- and 64-bit), Windows 8 (32- and 64-bit), Windows 8.1 (32- and 64-bit), Windows Server 2008, and Windows Server 2012.)

Autostart Technique

This Trojan adds the following registry entries to enable its automatic execution at every system startup:

HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Run
{random filename}.exe = "%Application Data%\Identities\{random filename}.exe"

Other System Modifications

This Trojan adds the following registry keys:

HKEY_CURRENT_USER\Software\Local AppWizard-Generated Applications

HKEY_CURRENT_USER\Software\Netscape\
5.0\682a6c2d\w682a6c2d

It adds the following registry entries:

HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Internet Settings
GlobalUserOffline = "0"

Other Details

This Trojan connects to the following possibly malicious URL:

  • http://{BLOCKED}.{BLOCKED}.26.52:8080/682a6c2d/2f59ea79/
  • http://{BLOCKED}.{BLOCKED}.86.207:8080/682a6c2d/2f59ea79/
  • http://{BLOCKED}.{BLOCKED}.123.186:8080/682a6c2d/2f59ea79/
  • http://{BLOCKED}.{BLOCKED}.170.164:8080/682a6c2d/2f59ea79/
  • http://{BLOCKED}.{BLOCKED}.220.50:8080/682a6c2d/2f59ea79/
  • http://{BLOCKED}.{BLOCKED}.17.185:8080/682a6c2d/2f59ea79/
  • http://{BLOCKED}.{BLOCKED}.199.119:8080/682a6c2d/2f59ea79/
  • http://{BLOCKED}.{BLOCKED}.174.144:8080/682a6c2d/2f59ea79/
  • http://{BLOCKED}.{BLOCKED}.249.53:8080/682a6c2d/2f59ea79/
  • http://{BLOCKED}.{BLOCKED}.59.161:8080/682a6c2d/2f59ea79/
  • http://{BLOCKED}.{BLOCKED}.169.146:8080/682a6c2d/2f59ea79/
  • http://{BLOCKED}.{BLOCKED}.162.180:8080/682a6c2d/2f59ea79/
  • http://{BLOCKED}.{BLOCKED}.111.17:8080/682a6c2d/2f59ea79/
  • http://{BLOCKED}.{BLOCKED}.1.22:8080/682a6c2d/2f59ea79/
  • http://{BLOCKED}.{BLOCKED}.231.167:8080/682a6c2d/2f59ea79/
  • http://{BLOCKED}.{BLOCKED}.54.24:8080/682a6c2d/2f59ea79/
  • http://{BLOCKED}.{BLOCKED}.99.214:8080/682a6c2d/2f59ea79/
  • http://{BLOCKED}.{BLOCKED}.59.191:8080/682a6c2d/2f59ea79/
  • http://{BLOCKED}.{BLOCKED}.110.43:8080/682a6c2d/2f59ea79/
  • http://{BLOCKED}.{BLOCKED}.24.35:8080/682a6c2d/2f59ea79/
  • http://{BLOCKED}.{BLOCKED}.174.192:8080/682a6c2d/2f59ea79/
  • http://{BLOCKED}.{BLOCKED}.213.92:8080/682a6c2d/2f59ea79/

However, as of this writing, the said sites are inaccessible.